The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"
☆13Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for CAIS
Users that are interested in CAIS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The codes of EncryptGAN. EncryptGAN: Towards Assymmetric Image Encryption and Hiding☆15Dec 17, 2021Updated 4 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆53Jan 12, 2021Updated 5 years ago
- The official implementation of MarineGPT☆42Mar 2, 2024Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- ☆13Dec 18, 2024Updated last year
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- A PyTorch implementation of Proxy Anchor Loss based on CVPR 2020 paper "Proxy Anchor Loss for Deep Metric Learning"☆11Jan 16, 2021Updated 5 years ago
- ☆12Dec 19, 2024Updated last year
- Pan-denoising: Guided Hyperspectral Image Denoising via Weighted Represent Coefficient Total Variation☆10Apr 14, 2025Updated 11 months ago
- Implementation of several Steganography and steganalysis techniques.☆50Nov 20, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- The official repository of "MarineInst: A Foundation Model for Marine Image Analysis with Instance Visual Description". [ECCV Oral 2024.]☆18Sep 24, 2024Updated last year
- ☆84Mar 9, 2025Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- My personal paper/code/dataset archives about computer vision☆13Jul 1, 2019Updated 6 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Source Code for View Consistent Purification for Accurate Cross-View Localization, ICCV 2023☆19Nov 24, 2024Updated last year
- ☆15Sep 21, 2020Updated 5 years ago
- Anomaly Detection Discriminative GAN (ADD-GAN)☆14Oct 9, 2017Updated 8 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- zero shot side scan sonar image classification☆15Mar 29, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- P4-network-slices-A: Using P4 to slice the substrate network.☆12Nov 4, 2017Updated 8 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Home of the LoCO-AUV Wiki! Also, configuration files for LoCO.☆14Jul 1, 2025Updated 8 months ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 3 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago