A distortion limiting approach to Syndrome-Trellis Coding.
☆19Mar 7, 2023Updated 3 years ago
Alternatives and similar repositories for stc-steganography
Users that are interested in stc-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python interface for Syndrome Trellis Codes Steganography☆20Mar 3, 2025Updated last year
- The project code is the Source code of the paper "Payload-Independent Direct Cost Learning for Image Steganography"☆13Oct 19, 2023Updated 2 years ago
- Hide data in plaintext☆16Mar 25, 2019Updated 7 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository contains an implementation of the 3D watermarking algorithm proposed by Cayre et al based on Spectral Decomposition.☆11Jun 3, 2018Updated 7 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆16Mar 25, 2021Updated 5 years ago
- Text steganography based on Markov chains☆36Mar 1, 2014Updated 12 years ago
- Hide color images in audio signals with neural networks. Steganography with deep learning.☆22Mar 21, 2023Updated 3 years ago
- 🦄Python 实现LSB算法进行信息隐藏 包含空域与变换域 JPEG信息隐藏算法 对PDF文件进行信息隐藏 基于卷积神经网络的隐写分析 Matlab SRM、SCA隐写分析☆179Nov 29, 2019Updated 6 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Sep 19, 2024Updated last year
- Paper To Code implementation of NVIDIA's GauGan on a custom Landscape 's Dataset. Generating photorealistic-ish:p images from drawings☆12May 6, 2022Updated 3 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆17Oct 3, 2023Updated 2 years ago
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- A list Viterbo algorithm for decoding PAC codes with various code constructions/rate-profiles☆11May 6, 2022Updated 3 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- ☆15Mar 2, 2014Updated 12 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆29Feb 28, 2021Updated 5 years ago
- Invisible Unicode Messages☆26Aug 27, 2015Updated 10 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- ☆10Feb 13, 2021Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆12Oct 28, 2023Updated 2 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- A collection of important papers on Generalizable Diffusion-generated Image Detection☆17Mar 20, 2025Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 7 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- This is a library to encode bits into text.... steganography in text!☆84Jun 23, 2017Updated 8 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- 👥 Federated Learning tutorial with TensorFlow Federated (TFF)☆14Jun 16, 2021Updated 4 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago