FlorianPicca / Linked-Pixel-SteganographyView external linksLinks
Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.
☆20May 16, 2023Updated 2 years ago
Alternatives and similar repositories for Linked-Pixel-Steganography
Users that are interested in Linked-Pixel-Steganography are comparing it to the libraries listed below
Sorting:
- This repository hosts the official project files of Team J.E.E.P. from the Philippines for the FE competition in WRO 2025, detailing thei…☆300Nov 28, 2025Updated 2 months ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 4 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- My user environment managed by nix with home-manager☆11Oct 29, 2020Updated 5 years ago
- Nix overlay for Cairo☆10May 8, 2024Updated last year
- ☆11Sep 14, 2025Updated 5 months ago
- ☆12Apr 20, 2017Updated 8 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago
- It is a way to embedding two secret images onto one carrier image. Uses frequency magnitude modulation.☆14May 22, 2025Updated 8 months ago
- Nimiq Blockchain developer reference☆13Oct 25, 2019Updated 6 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- 📟 The console client for Olivia☆15Oct 20, 2022Updated 3 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆15Mar 25, 2021Updated 4 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Hard-to-detect image steganography☆50Feb 8, 2025Updated last year
- Image-Steganography-LSB is a command-line application that enables users to perform steganography using the Least Significant Bit (LSB) a…☆23Mar 1, 2025Updated 11 months ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- ☆27Sep 9, 2021Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Generate the interfaces for your Cairo contracts☆33Oct 29, 2022Updated 3 years ago
- Lightweight AI Telegram bot for Raspberry Pi Zero 2W - DeepSeek API, 85MB RAM, LCD display☆29Jan 29, 2026Updated 2 weeks ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- A watermarking/steganography library that can hide a byte sequence (like a text/string) inside a cover text☆17Updated this week
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- A library to run your Arduino code on a desktop OS☆11Nov 6, 2022Updated 3 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- Uncensored Stable Diffusion PoC (NSFW)☆14May 13, 2024Updated last year
- CES VHDL utility library, with packages, memories, FIFOs, Clock Domain Crossing and more useful VHDL modules☆11Jan 17, 2022Updated 4 years ago