yamizi / Adversarial-EmbeddingView external linksLinks
☆18Feb 16, 2023Updated 2 years ago
Alternatives and similar repositories for Adversarial-Embedding
Users that are interested in Adversarial-Embedding are comparing it to the libraries listed below
Sorting:
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- ☆30May 6, 2017Updated 8 years ago
- A pytorch implementation of Deep Residual Network for Steganalysis of Digital Images (SRNet)☆100Sep 27, 2022Updated 3 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- code of our paper entitled: Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the AppropriateSteganalyzer betwee…☆29Jan 3, 2017Updated 9 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Jan 30, 2018Updated 8 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Oct 24, 2022Updated 3 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Jan 12, 2021Updated 5 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- Frictionless Machine Learning on Kubernetes☆15Mar 7, 2023Updated 2 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Dec 26, 2019Updated 6 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- ☆17Feb 6, 2024Updated 2 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆369Mar 23, 2023Updated 2 years ago
- Hard-to-detect image steganography☆50Feb 8, 2025Updated last year
- Examples for darkon☆16Feb 5, 2018Updated 8 years ago
- Repository for the implementation of our work on hypergraph generation as part of the ANR project "SODA".☆13Oct 27, 2025Updated 3 months ago
- ☆10May 14, 2023Updated 2 years ago
- A selection of resources from Binghamton University's EECE580G - Deep Learning for ECE course☆12May 21, 2021Updated 4 years ago
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- 🍿️some awesome Steganalysis☆40Aug 5, 2018Updated 7 years ago
- ☆47Feb 21, 2020Updated 5 years ago
- Code for "JPEG-resistant Adversarial Images"☆43Apr 25, 2018Updated 7 years ago
- Implementation of "Deep Learning Hierarchical Representation for Image Steganalysis" by TensorFlow☆11Mar 10, 2018Updated 7 years ago
- A set of Jupyter notebooks capturing an effort to apply Keras to the problem of automatic knowledge base construction.☆11Aug 30, 2016Updated 9 years ago
- DataStructure and Algorithm problems for software engineering interviews.☆15Feb 1, 2021Updated 5 years ago