☆18Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Adversarial-Embedding
Users that are interested in Adversarial-Embedding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆58Oct 7, 2017Updated 8 years ago
- List for learning image steganography☆35Jun 11, 2024Updated last year
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 6 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆55Jan 30, 2018Updated 8 years ago
- Light Field Messaging with Deep Photographic Steganography☆44Nov 10, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆124Jun 21, 2021Updated 4 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Hard-to-detect image steganography☆53Feb 8, 2025Updated last year
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Oct 24, 2022Updated 3 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆54Jan 12, 2021Updated 5 years ago
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- Code for "Mixture-based feature space learning for few-shot image classification"-ICCV'2021.☆14Oct 13, 2021Updated 4 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- The code for "SCL: Self-supervised contrastive learning for few-shot image classification"☆20Oct 8, 2024Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- ☆29Jun 27, 2022Updated 3 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Extraction of watermark embedded with E_BLIND method on multiple digital works.☆13Sep 14, 2016Updated 9 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis☆21Dec 6, 2021Updated 4 years ago
- PyTorch implementation of the classical image steganalysis networks, compatible with both grayscale and color images, and supporting mult…☆86Dec 26, 2023Updated 2 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆70Oct 27, 2021Updated 4 years ago
- ☆29Jul 26, 2021Updated 4 years ago
- Code from my research papers☆12May 12, 2022Updated 3 years ago