没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)
☆23Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for CIHC-2019
Users that are interested in CIHC-2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆72Oct 27, 2021Updated 4 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- ☆18Feb 16, 2023Updated 3 years ago
- 🦄Python 实现LSB算法进行信息隐藏 包含空域与变换域 JPEG信息隐藏算法 对PDF文件进行信息隐藏 基于卷积神经网络的隐写分析 Matlab SRM、SCA隐写分析☆179Nov 29, 2019Updated 6 years ago
- A Python interface for Syndrome Trellis Codes Steganography☆20Mar 3, 2025Updated last year
- An open-source toolbox for steganalysis☆200Mar 13, 2026Updated last week
- Official pytorch implementation of paper "Image Disentanglement Autoencoder for Steganography without Embedding" (CVPR2022).☆52Nov 16, 2022Updated 3 years ago
- ☆33Nov 3, 2022Updated 3 years ago
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Sep 14, 2022Updated 3 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Paper To Code implementation of NVIDIA's GauGan on a custom Landscape 's Dataset. Generating photorealistic-ish:p images from drawings☆12May 6, 2022Updated 3 years ago
- A selection of resources from Binghamton University's EECE580G - Deep Learning for ECE course☆12May 21, 2021Updated 4 years ago
- A list Viterbo algorithm for decoding PAC codes with various code constructions/rate-profiles☆11May 6, 2022Updated 3 years ago
- Extraction of watermark embedded with E_BLIND method on multiple digital works.☆13Sep 14, 2016Updated 9 years ago
- For CVPR2022 Submission☆10Sep 4, 2022Updated 3 years ago
- 3rd place solution for ALASKA2 Image Steganalysis on Kaggle☆12Mar 3, 2021Updated 5 years ago
- The JPEG toolbox for Python☆16Mar 31, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Oct 28, 2023Updated 2 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- 👥 Federated Learning tutorial with TensorFlow Federated (TFF)☆14Jun 16, 2021Updated 4 years ago
- 空域明文可逆信息隐藏☆11Jul 6, 2020Updated 5 years ago
- 利用vgg-16/19预训练模型提取图片的特征☆26Nov 2, 2018Updated 7 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- ☆13Aug 9, 2023Updated 2 years ago
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16May 8, 2020Updated 5 years ago
- Files necessary to add comments to Jekyll through use of Google Forms: https://jdvp.me/articles/Google-Forms-Jekyll-Comments☆15Sep 17, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- mp3 steganography library☆21Apr 11, 2025Updated 11 months ago
- ☆22Feb 16, 2023Updated 3 years ago
- Breaking the Alaska steganalysis challenge☆45Mar 24, 2023Updated 3 years ago
- Identity-Based Encryption☆19Oct 18, 2012Updated 13 years ago
- Several state-of-the-arts RDH schemes for JPEG images implemented by me.☆10Jun 2, 2020Updated 5 years ago
- VMWare vRealize SSRF-CVE-2021-21975☆14Apr 2, 2021Updated 4 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago