Simple LSB and DCT. 用Python简单实现LSB和DCT,并用于图像的信息隐藏
☆16Jan 10, 2020Updated 6 years ago
Alternatives and similar repositories for Steganography
Users that are interested in Steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compare efficiency of steganographic processes LSB,DCT and DWT☆61May 8, 2020Updated 6 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- covert communication by encoding data in the frequency domain of jpeg images.☆15Feb 16, 2026Updated 2 months ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Sep 19, 2024Updated last year
- CNN Fault Diagnosis on CWRU Dataset via Wavelet Filtering☆14Jan 17, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CTPN and CRNN based Chinese OCR, developed with PyQt5☆22Sep 18, 2021Updated 4 years ago
- Code for paper Audio Visual Speaker Localization from EgoCentric Views☆11Jul 3, 2024Updated last year
- CNN and LSTM have been trained on CWRU Bearing Dataset and results tested on Simulink Data☆18Oct 5, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Training and evaluation codes for the BertGen paper (ACL-IJCNLP 2021)☆11Sep 17, 2023Updated 2 years ago
- The repository of CLEME (EMNLP 2023) and CLEME2.0 (ACL 2025)☆12May 17, 2025Updated 11 months ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Graph Convolutional Networks (GCNs)☆10Nov 29, 2017Updated 8 years ago
- 《信息隐藏技术》第五次实验——DCT域的信息隐藏☆17Mar 29, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- chemical master equation solver☆16May 2, 2018Updated 8 years ago
- 🎶 Open-source DAW to collaborate on music using Git.☆15Apr 6, 2024Updated 2 years ago
- 智能优化算法的python手动实现,注释详细☆20Apr 11, 2022Updated 4 years ago
- ☆13Aug 9, 2023Updated 2 years ago
- 多语言降噪预训练模型MBart的中文生成任务☆11May 27, 2021Updated 4 years ago
- 美团外卖商家版爬虫☆16Apr 13, 2023Updated 3 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Identity-Based Encryption☆19Oct 18, 2012Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code and dataset for 'Contrastive Aligned Joint Learning for Multilingual Summarization'☆13Mar 24, 2022Updated 4 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Code for running the experiments in Deep Subjecthood: Higher Order Grammatical Features in Multilingual BERT☆17Aug 15, 2023Updated 2 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 4 years ago
- Several state-of-the-arts RDH schemes for JPEG images implemented by me.☆10Jun 2, 2020Updated 5 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆18Jun 5, 2021Updated 4 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- Stores email header and body information in JSON format☆12Mar 10, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 5 years ago
- Digital Image Watermarking use matlab(DWT,DCT), GUI use python☆12Oct 8, 2019Updated 6 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- This repository open-sources our GEC system submitted by THU KELab (sz) in the CCL2023-CLTC Track 1: Multidimensional Chinese Learner Tex…☆15Nov 25, 2023Updated 2 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 6 years ago
- The encrypted steganography filesystem☆42Jan 12, 2011Updated 15 years ago