☆18Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for Adversarial-Embedding
Users that are interested in Adversarial-Embedding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- A fast and effective global covariance pooling network for image steganalysis in spatial domain.☆21Jul 24, 2019Updated 6 years ago
- Pytorch implementation of "Deep Learning Hierarchical Representations for Image Steganalysis"☆58Oct 7, 2017Updated 8 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Jul 3, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- ☆10Nov 8, 2021Updated 4 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 6 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆38Feb 11, 2018Updated 8 years ago
- Generating Adversarial Images for Image-to-Image models in Pytorch☆18Feb 10, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆55Jan 30, 2018Updated 8 years ago
- Light Field Messaging with Deep Photographic Steganography☆44Nov 10, 2020Updated 5 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆123Jun 21, 2021Updated 4 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Hard-to-detect image steganography☆53Feb 8, 2025Updated last year
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago
- 没有图像隐写检测代码 【针对nsF5 UERD J-UNIWARD 】(未完成)☆23Oct 24, 2022Updated 3 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆54Jan 12, 2021Updated 5 years ago
- The source code of our WACV2020 paper "Self-Contained Stylization via Steganographyfor Reverse and Serial Style Transfer".☆11Jun 8, 2023Updated 2 years ago
- Code for "Mixture-based feature space learning for few-shot image classification"-ICCV'2021.☆14Oct 13, 2021Updated 4 years ago
- Steganalysis based deep learning☆58May 11, 2020Updated 5 years ago
- A selection of resources from Binghamton University's EECE580G - Deep Learning for ECE course☆12May 21, 2021Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆21Jan 15, 2020Updated 6 years ago
- The code for "SCL: Self-supervised contrastive learning for few-shot image classification"☆20Oct 8, 2024Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆379Mar 23, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆28Jun 27, 2022Updated 3 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- Extraction of watermark embedded with E_BLIND method on multiple digital works.☆13Sep 14, 2016Updated 9 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis☆21Dec 6, 2021Updated 4 years ago
- PyTorch implementation of the classical image steganalysis networks, compatible with both grayscale and color images, and supporting mult…☆85Dec 26, 2023Updated 2 years ago
- 3rd place solution for ALASKA2 Image Steganalysis on Kaggle☆12Mar 3, 2021Updated 5 years ago