There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding
This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-Labeling
This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling".Reversible-Data-Hiding-in-Encrypted-Images-Based-on-Pixel-Prediction-and-Bit-plane-Compression
This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".Reversible-Data-Hiding-in-JPEG-Images-with-Multi-objective-Optimization
This code is the implementation of the paper "Reversible Data Hiding in JPEG Images with Multi Objective Optimization".RDH-EI-based-on-pixel-prediction-and-multi-MSB-planes-rearrangement
This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement".High-Capacity-Reversible-Data-Hiding-in-Encrypted-Images-using-Adaptive-Encoding
This code is the implementation of the paper "High-Capacity-Reversible-Data-Hiding-in-Encrypted-Images-using-Adaptive-Encoding".Reversible-data-hiding-based-on-reducing-invalid-shifting-of-pixels-in-histogram-shifting
This code is the implementation of the paper "Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting". (DOI: 10.1016/j.sigpro.2019.05.020)Defense-against-Adversarial-Attacks-by-Low-level-Image-Transformations
This code is the implementation of the adversarial defense method introduced in the paper "Defense against Adversarial Attacks by Low-level Image Transformations".Neural_network_fragile_watermarking_with_no_model_performance_degradation
DNN-fragile-watermarking-masterSeparable-Reversible-Data-Hiding-Based-on-Integer-Mapping-and-MSB-Prediction-for-Encrypted-3D-Mesh-M
New-framework-for-code-mapping-based-reversible-data-hiding-in-JPEG-images
codeReversible-data-hiding-based-on-automatic-contrast-enhancement-using-histogram-expansion
edu-yinzhaoxia.github.io
High-Capacity-Reversible-Data-Hiding-in-Encrypted-3D-Mesh-Models-Based-on-Multi-MSB-Prediction
codeRobust-Adaptive-Steganography-Based-on-Dither-Modulation-and-Modification-With-Re-Compression
Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-CompressionReversible-Adversarial-Attack-based-on-Reversible-Image-Transformation
codeReversible-attack-based-on-adversarial-perturbation-and-reversible-data-hiding-in-YUV-colorspace
Robust-image-steganography-against-lossy-JPEG-compression-based-on-embedding-domain-selection
Reversible-Data-Hiding-for-3D-Mesh-Model-in-Encrypted-Domain-Based-on-Vertex
Attention-guided-black-box-adversarial-attacks-with-large-scale-multiobjective-evolutionary-optimiza
codeUAP-related-experimental-code
UAP related experimental codeHigh-Capacity-Reversible-Data-Hiding-for-Encrypted-3D-Mesh-Models-Based-on-Topology
Imperceptible-Adversarial-Attack-on-S-Channel-of-HSV-Colorspace
On-the-security-and-robustness-of-Keyless-dynamic-optimal-multi-bit-image-steganography-
On the security and robustness of “Keyless dynamic optimal multi-bit image steganography using energetic pixels”Local-Texture-Complexity-Guided-Adversarial-Attack
Love Open Source and this site? Check out how you can help us