shaina-12 / Image-Steganography---Digital-Watermarking-to-Hide-Text-Messages---Networking-5th-Sem-Project
This project is based on image steganography using DCT and AES encryption systems.
☆15Updated 2 years ago
Alternatives and similar repositories for Image-Steganography---Digital-Watermarking-to-Hide-Text-Messages---Networking-5th-Sem-Project
Users that are interested in Image-Steganography---Digital-Watermarking-to-Hide-Text-Messages---Networking-5th-Sem-Project are comparing it to the libraries listed below
Sorting:
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆22Updated 5 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆66Updated 3 years ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Updated 3 years ago
- ☆25Updated 4 years ago
- 可逆水印论文复现☆9Updated 5 years ago
- An end-to-end project that hides a medical report and its data. Medical data is sensitive, and using steganography, watermarking, and cry…☆8Updated last year
- DiffWA: Diffusion Models for Watermark Attack☆11Updated last year
- Deep residual network for steganalysis of digital images☆18Updated last year
- ☆53Updated last year
- ☆26Updated 2 years ago
- Applying Laplace and exponential mechanisms to add random noise to data for differential privacy. Plotting MSE vs. epsilon.☆29Updated 4 years ago
- The source code for the paper "Beyond Similarity: Personalized Federated Recommendation with Composite Aggregation".☆10Updated 5 months ago
- Reversible data hiding with automatic brightness contrast enhancement. This repository contains the code from IEEE paper https://ieeexplo…☆17Updated 4 years ago
- A course recommendation system using the Coursera Courses dataset which contains over 3,000 courses.☆28Updated last year
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 3 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 4 years ago
- This is a PyTorch Reimplementation of High-Capacity Convolutional Video Steganography with Temporal Residual Modeling (ICMR2019, oral)☆9Updated 3 years ago
- Code for ijcai-24 paper "Federated Adaptation for Foundation Model-based Recommendations"☆10Updated last month
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Updated 5 years ago
- AES 256 & RSA encrypted video steganography. SRU Hackathon 2022 - Cybersecurity Winners☆23Updated last year
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆35Updated 4 years ago
- Reversible Data Hiding in Color Image With Grayscale Invariance☆34Updated last year
- Image Encryption using DES, AES & RSA Algorithm☆27Updated 7 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 4 years ago
- Replicated paper: END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY☆10Updated 5 years ago
- ☆17Updated 7 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆10Updated 4 years ago
- 这是我的毕业设计,要求的是带差分隐私的推荐系统,算法采用协同过滤☆41Updated 4 years ago
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆11Updated 2 years ago
- 一种新的基于混沌映射的比特级图像加密算法的 python 实现(原论文题目:A novel bit-level image encryption algorithm based on chaotic maps,链接:https://doi.org/10.1016/j.opt…☆21Updated 2 years ago