☆18Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Adversarial-Embedding
Users that are interested in Adversarial-Embedding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- ☆30May 6, 2017Updated 8 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆101Sep 27, 2022Updated 3 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆58Oct 7, 2017Updated 8 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Jan 30, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- A Siamese CNN for Image Steganalysis☆82Oct 27, 2020Updated 5 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Hard-to-detect image steganography☆52Feb 8, 2025Updated last year
- Repository contains Google colab notebooks used for faceswaping☆30Dec 10, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Oct 24, 2022Updated 3 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆53Jan 12, 2021Updated 5 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- The code for "SCL: Self-supervised contrastive learning for few-shot image classification"☆20Oct 8, 2024Updated last year
- 2022年华为软件精英赛初赛☆11Apr 2, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆376Mar 23, 2023Updated 3 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- Extraction of watermark embedded with E_BLIND method on multiple digital works.☆13Sep 14, 2016Updated 9 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis☆20Dec 6, 2021Updated 4 years ago
- PyTorch implementation of the classical image steganalysis networks, compatible with both grayscale and color images, and supporting mult…☆83Dec 26, 2023Updated 2 years ago