A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficients. This application was developed for a graduate-level university project.
☆38Sep 19, 2024Updated last year
Alternatives and similar repositories for DCT-Image-Steganography
Users that are interested in DCT-Image-Steganography are comparing it to the libraries listed below
Sorting:
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- A distortion limiting approach to Syndrome-Trellis Coding.☆19Mar 7, 2023Updated 3 years ago
- This is an image encryption project using AES in Python 2.7.15☆12Oct 7, 2020Updated 5 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 4 years ago
- Deep Reinforcement Learning library for Python☆10Jun 9, 2022Updated 3 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- python program to hide texts inside a video using LSB transformation☆38Jul 14, 2020Updated 5 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- MUD + Unity tutorial☆10Jul 24, 2023Updated 2 years ago
- ☆12Oct 8, 2025Updated 4 months ago
- Start a Hardhat Network node from the command line☆12Oct 1, 2021Updated 4 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- Playdate Horror game being written in Love2D, then refactored to be playable on the Playdate.☆14Jul 1, 2022Updated 3 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Python Steganography data hiding in image☆10Dec 25, 2021Updated 4 years ago
- A CLI tool for auto updating your Twitter banner with a Solvency.art NFT render every 60s☆12Sep 5, 2021Updated 4 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated 2 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Inform 7 with illustrative examples of play☆12Aug 23, 2024Updated last year
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- This is a Node.js wrapper around ZoKrates.☆10May 18, 2020Updated 5 years ago
- An infinite canvas built for brainstorming.☆13Jul 31, 2024Updated last year
- From barbarism to civilization requires a century; from civilization to barbarism needs but a day.☆12Jul 17, 2023Updated 2 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago