suahnkim / skewed_histogram_shiftingLinks
Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results from submitted paper: https://ieeexplore.ieee.org/abstract/document/8517133.
☆10Updated 4 years ago
Alternatives and similar repositories for skewed_histogram_shifting
Users that are interested in skewed_histogram_shifting are comparing it to the libraries listed below
Sorting:
- Reversible data hiding with automatic brightness contrast enhancement. This repository contains the code from IEEE paper https://ieeexplo…☆18Updated 4 years ago
- ☆26Updated 4 years ago
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆48Updated 2 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆93Updated 2 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆14Updated 3 years ago
- ☆17Updated 8 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆119Updated 4 years ago
- ☆13Updated 6 years ago
- ☆53Updated 3 weeks ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆126Updated 7 years ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆49Updated 5 years ago
- Implementation of "Copy Move Source-Target Disambiguation through Multi-Branch CNNs" by Mauro Barni, Quoc-Tin Phan, Benedetta Tondi☆14Updated 2 years ago
- DOA-GAN: Dual-Order Attentive Generative Adversarial Network for Image Copy-move Forgery Detection and Localization☆23Updated 3 years ago
- This is the source code of paper MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compressi…☆102Updated last year
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆55Updated 5 years ago
- Light Field Messaging with Deep Photographic Steganography☆42Updated 4 years ago
- Official PyTorch implementation of "HiNet: Deep Image Hiding by Invertible Network" (ICCV 2021)☆189Updated 3 years ago
- This is a PyTorch Reimplementation of High-Capacity Convolutional Video Steganography with Temporal Residual Modeling (ICMR2019, oral)☆9Updated 3 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Updated 5 years ago
- Code for paper "Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection"☆43Updated 4 years ago
- ☆27Updated 2 years ago
- 🍿️some awesome Steganalysis☆37Updated 6 years ago
- A Siamese CNN for Image Steganalysis☆74Updated 4 years ago
- Paper 'Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms' in ACM Multimedia '22.☆59Updated 2 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆49Updated 4 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Updated 7 years ago
- ☆51Updated 2 years ago
- Hiding Images in Plain Sight: Deep Steganography☆39Updated 7 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Updated 4 years ago