zhengziqiang / CAISView external linksLinks
The implementation of "Component Aware Image Steganography via Adversarial Global-and-Part Checking"
☆13Oct 12, 2023Updated 2 years ago
Alternatives and similar repositories for CAIS
Users that are interested in CAIS are comparing it to the libraries listed below
Sorting:
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Photo-to-Caricature Translation☆17May 10, 2019Updated 6 years ago
- The codes of EncryptGAN. EncryptGAN: Towards Assymmetric Image Encryption and Hiding☆15Dec 17, 2021Updated 4 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- 深度学习 隐写术;使用神经网络以图藏图(NIPS2017),torch版本 paper:Hiding Images in Plain Sight:Deep Steganography https://papers.nips.cc/paper/2017/hash/838e8…☆23Dec 4, 2020Updated 5 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆51Jan 12, 2021Updated 5 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated 11 months ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆121Jun 21, 2021Updated 4 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- The official implementation of MarineGPT☆41Mar 2, 2024Updated last year
- ☆31Jul 23, 2021Updated 4 years ago
- ☆13Dec 18, 2024Updated last year
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- A platform for managing members of the Alumni Association.☆11Updated this week
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Aug 7, 2025Updated 6 months ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- 利用Python编 写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- Hiding Images in Plain Sight: Deep Steganography☆39Jun 18, 2018Updated 7 years ago
- The paper, dataset and code lists of underwater image enhancement☆44Oct 4, 2021Updated 4 years ago
- Image steganography usings Generative Adverserial Networks☆42Oct 12, 2024Updated last year
- ☆22Jul 13, 2022Updated 3 years ago
- The official repository of "MarineInst: A Foundation Model for Marine Image Analysis with Instance Visual Description". [ECCV Oral 2024.]☆17Sep 24, 2024Updated last year
- Event-driven, Investment plan and Automations, Transfer, Payment, notification and Topup, RabbitMQ, Docker, postgreSQL, JWT, Async Rest-A…☆12May 31, 2022Updated 3 years ago
- Pan-denoising: Guided Hyperspectral Image Denoising via Weighted Represent Coefficient Total Variation☆10Apr 14, 2025Updated 10 months ago
- 基于位平面压缩和直方图平移法的图像可逆信息隐藏算法☆16Jul 11, 2019Updated 6 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- A Value Investment Strategy That Combines Security Selection And Market Timing Signals☆10Sep 8, 2019Updated 6 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- A PyTorch implementation of ACNet based on TCSVT 2023 paper "ACNet: Approaching-and-Centralizing Network for Zero-Shot Sketch-Based Image…☆10Dec 8, 2023Updated 2 years ago