• Stars
    star
    6
  • Rank 2,539,965 (Top 51 %)
  • Language
    MATLAB
  • Created about 3 years ago
  • Updated almost 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

More Repositories

1

Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding

This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".
MATLAB
26
star
2

An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-Labeling

This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling".
MATLAB
14
star
3

Reversible-Data-Hiding-in-Encrypted-Images-Based-on-Pixel-Prediction-and-Bit-plane-Compression

This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".
MATLAB
13
star
4

Reversible-Data-Hiding-in-JPEG-Images-with-Multi-objective-Optimization

This code is the implementation of the paper "Reversible Data Hiding in JPEG Images with Multi Objective Optimization".
MATLAB
12
star
5

RDH-EI-based-on-pixel-prediction-and-multi-MSB-planes-rearrangement

This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement".
MATLAB
11
star
6

High-Capacity-Reversible-Data-Hiding-in-Encrypted-Images-using-Adaptive-Encoding

This code is the implementation of the paper "High-Capacity-Reversible-Data-Hiding-in-Encrypted-Images-using-Adaptive-Encoding".
MATLAB
9
star
7

Reversible-data-hiding-based-on-reducing-invalid-shifting-of-pixels-in-histogram-shifting

This code is the implementation of the paper "Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting". (DOI: 10.1016/j.sigpro.2019.05.020)
MATLAB
9
star
8

Defense-against-Adversarial-Attacks-by-Low-level-Image-Transformations

This code is the implementation of the adversarial defense method introduced in the paper "Defense against Adversarial Attacks by Low-level Image Transformations".
Python
7
star
9

Neural_network_fragile_watermarking_with_no_model_performance_degradation

DNN-fragile-watermarking-master
Python
6
star
10

New-framework-for-code-mapping-based-reversible-data-hiding-in-JPEG-images

code
MATLAB
4
star
11

Reversible-data-hiding-based-on-automatic-contrast-enhancement-using-histogram-expansion

MATLAB
3
star
12

edu-yinzhaoxia.github.io

HTML
3
star
13

High-Capacity-Reversible-Data-Hiding-in-Encrypted-3D-Mesh-Models-Based-on-Multi-MSB-Prediction

code
MATLAB
3
star
14

Robust-Adaptive-Steganography-Based-on-Dither-Modulation-and-Modification-With-Re-Compression

Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression
MATLAB
3
star
15

Reversible-Adversarial-Attack-based-on-Reversible-Image-Transformation

code
MATLAB
3
star
16

PISA-Pixel-Skipping-based-Attentional-Black-box-Adversarial-Attack

MATLAB
2
star
17

Reversible-attack-based-on-adversarial-perturbation-and-reversible-data-hiding-in-YUV-colorspace

Python
2
star
18

Robust-image-steganography-against-lossy-JPEG-compression-based-on-embedding-domain-selection

MATLAB
2
star
19

Reversible-Data-Hiding-for-3D-Mesh-Model-in-Encrypted-Domain-Based-on-Vertex

MATLAB
1
star
20

Attention-guided-black-box-adversarial-attacks-with-large-scale-multiobjective-evolutionary-optimiza

code
MATLAB
1
star
21

UAP-related-experimental-code

UAP related experimental code
Jupyter Notebook
1
star
22

High-Capacity-Reversible-Data-Hiding-for-Encrypted-3D-Mesh-Models-Based-on-Topology

MATLAB
1
star
23

Imperceptible-Adversarial-Attack-on-S-Channel-of-HSV-Colorspace

Python
1
star
24

On-the-security-and-robustness-of-Keyless-dynamic-optimal-multi-bit-image-steganography-

On the security and robustness of “Keyless dynamic optimal multi-bit image steganography using energetic pixels”
MATLAB
1
star
25

Local-Texture-Complexity-Guided-Adversarial-Attack

Python
1
star