Implementation of Reversible Data Hiding technique
☆12Oct 28, 2016Updated 9 years ago
Alternatives and similar repositories for Reversible-Data-Hiding
Users that are interested in Reversible-Data-Hiding are comparing it to the libraries listed below
Sorting:
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models☆12Aug 17, 2021Updated 4 years ago
- Reversible data hiding with automatic brightness contrast enhancement. This repository contains the code from IEEE paper https://ieeexplo…☆18Apr 22, 2021Updated 4 years ago
- Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to hide data inside images☆12Nov 9, 2019Updated 6 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- ☆30Mar 11, 2021Updated 4 years ago
- Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks☆25Oct 1, 2021Updated 4 years ago
- Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13May 22, 2019Updated 6 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Sep 6, 2019Updated 6 years ago
- 一步步带你通过项目(MNIST手写识别)学习入门TensorFlow以及神经网络的知识☆11Oct 5, 2018Updated 7 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- PRA-TPE: Perfectly recoverable approximate thumbnail-preserving image encryption☆11Mar 24, 2022Updated 3 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago
- ☆11Aug 21, 2017Updated 8 years ago
- Embed Data Into a Picture reversibly using difference expansion☆10Dec 20, 2013Updated 12 years ago
- Utility for converting TLE to Keplerian elements and GMAT code☆12Mar 28, 2020Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- papers and documents☆10May 15, 2018Updated 7 years ago
- DiffWA: Diffusion Models for Watermark Attack☆10Apr 23, 2024Updated last year
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Apr 3, 2022Updated 3 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- ☆10Feb 13, 2021Updated 5 years ago
- KMean Coreset evaluation and computation.☆12Jun 6, 2017Updated 8 years ago
- 基于位平面压缩和直方图平移法的图像可逆信息隐藏算法☆16Jul 11, 2019Updated 6 years ago
- ☆11Dec 30, 2021Updated 4 years ago
- 过往收集和学习的 pdf 电子 书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集☆12Mar 28, 2025Updated 11 months ago
- Implementation of GAN in tensorflow☆11May 4, 2017Updated 8 years ago
- Extension of Real time Spatio-Temporal clustering☆13May 16, 2017Updated 8 years ago
- A Blockchain Implementation in MATLAB.☆12May 1, 2023Updated 2 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- 可逆水印论文复现☆10Nov 30, 2019Updated 6 years ago
- Hotglue Content Manipulation System☆14Oct 19, 2019Updated 6 years ago
- NASA General Mission Analysis Tool (GMAT) used as a spacecraft simulator for the Quindar Mission Operations software.☆14Aug 27, 2018Updated 7 years ago
- Clustering of Taxi Trajectories☆11Aug 23, 2018Updated 7 years ago
- An implementation of a simple asynchronous message-passing lock server, verified in Coq using the Verdi framework☆14Oct 23, 2017Updated 8 years ago
- Video editing for programmers☆10Dec 18, 2020Updated 5 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 7 years ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago