The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"
☆13Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for CAIS
Users that are interested in CAIS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Photo-to-Caricature Translation☆17May 10, 2019Updated 7 years ago
- The codes of EncryptGAN. EncryptGAN: Towards Assymmetric Image Encryption and Hiding☆15Dec 17, 2021Updated 4 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆54Jan 12, 2021Updated 5 years ago
- The official implementation of MarineGPT☆42Mar 2, 2024Updated 2 years ago
- ReshapeGAN: Object Reshaping by Providing A Single Reference Image☆40Oct 29, 2019Updated 6 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Transformer(attention-is-all-you-need)的pytorch实现,带run demo,可以跑通☆10Apr 16, 2019Updated 7 years ago
- 基于位平面压缩和直方图平移法的图像可逆信息隐藏算法☆16Jul 11, 2019Updated 6 years ago
- Advent Of Code 2015-2022☆13Dec 10, 2025Updated 4 months ago
- The paper, dataset and code lists of underwater image enhancement☆47Oct 4, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Image Steganography using K-Means clustering and DES encryption☆11Dec 7, 2020Updated 5 years ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆12Jul 3, 2019Updated 6 years ago
- ForkGAN: Seeing into the rainy night. ECCV 2020 (oral). A task-agnostic image translation framework that can boost multiple vision tasks …☆130Oct 3, 2023Updated 2 years ago
- ☆13Dec 18, 2024Updated last year
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆124Jun 21, 2021Updated 4 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- A PyTorch implementation of Proxy Anchor Loss based on CVPR 2020 paper "Proxy Anchor Loss for Deep Metric Learning"☆11Jan 16, 2021Updated 5 years ago
- ☆12Dec 19, 2024Updated last year
- Pan-denoising: Guided Hyperspectral Image Denoising via Weighted Represent Coefficient Total Variation☆10Apr 14, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Implementation of several Steganography and steganalysis techniques.☆51Nov 20, 2025Updated 5 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- ☆31Jun 2, 2018Updated 7 years ago
- ☆19Oct 7, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- The official repository of "MarineInst: A Foundation Model for Marine Image Analysis with Instance Visual Description". [ECCV Oral 2024.]☆18Sep 24, 2024Updated last year
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- ☆86Mar 9, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- advent of code 2020☆30Dec 25, 2020Updated 5 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A PyTorch implementation of ACNet based on TCSVT 2023 paper "ACNet: Approaching-and-Centralizing Network for Zero-Shot Sketch-Based Image…☆11Dec 8, 2023Updated 2 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Image steganography usings Generative Adverserial Networks☆43Oct 12, 2024Updated last year
- ☆31Jul 23, 2021Updated 4 years ago
- My personal paper/code/dataset archives about computer vision☆14Jul 1, 2019Updated 6 years ago