☆13Jan 30, 2019Updated 7 years ago
Alternatives and similar repositories for WISERNet
Users that are interested in WISERNet are comparing it to the libraries listed below
Sorting:
- Light Field Messaging with Deep Photographic Steganography☆43Nov 10, 2020Updated 5 years ago
- GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification☆15Mar 25, 2023Updated 2 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆14Nov 2, 2021Updated 4 years ago
- The codes for the paper "A Novel Two-stage Separable Deep Learning Framework for Practical Blind Watermarking"☆51Mar 10, 2020Updated 5 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Oct 7, 2017Updated 8 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- ☆30May 6, 2017Updated 8 years ago
- ☆14Mar 12, 2023Updated 2 years ago
- Embed Data Into a Picture reversibly using difference expansion☆10Dec 20, 2013Updated 12 years ago
- We Need No Pixels: Video Manipulation Detection Using Stream Descriptors☆10Oct 4, 2019Updated 6 years ago
- Under construction☆11Nov 20, 2022Updated 3 years ago
- ☆12Aug 14, 2018Updated 7 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- ☆11Feb 27, 2025Updated last year
- ☆13Sep 2, 2023Updated 2 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- ☆51Jan 17, 2023Updated 3 years ago
- SImple Tensorflow implementations of " Image-to-Image Translation with Conditional Adversarial Networks" (CVPR 2017)☆10Apr 11, 2018Updated 7 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆105Aug 2, 2022Updated 3 years ago
- ☆13Aug 12, 2019Updated 6 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 7 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- Official PyTorch implementation of the Motion-adaptive Transformer for Event-based Image Deblurring (AAAI 2025).☆16May 7, 2025Updated 9 months ago
- A drawer module for some programming language.☆10Mar 5, 2023Updated 2 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- ☆52Feb 24, 2024Updated 2 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- Implementation of "Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries" paper.☆104Jan 13, 2020Updated 6 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated 11 months ago
- ☆13Feb 19, 2022Updated 4 years ago
- Detection of Object-Based Forgery in Advanced Video☆14May 7, 2017Updated 8 years ago
- [ECCV 2018] Unsupervised Holistic Image Generation from Key Local Patches☆12Jul 29, 2019Updated 6 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago