Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/122593277
☆24Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for FdSig
Users that are interested in FdSig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24May 30, 2018Updated 7 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated 2 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- extract the dct coefficient of jpeg images. Provide c and python interface.☆16May 8, 2020Updated 5 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- Icmake is a make utility using a C-line grammar☆10Jan 17, 2020Updated 6 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Here you find the implementation of the method described in our SIBGRAPI 2019 paper "Hierarchy-of-Visual-Words: a Learning-based Approach…☆10Mar 1, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Plug-in for development GIMP 2.99 for loading/saving JPEG XL (JXL) images.☆15Feb 14, 2022Updated 4 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago
- ☆16May 26, 2021Updated 4 years ago
- ☆59May 18, 2021Updated 4 years ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- Explanation Ontology Resource website☆12Jun 8, 2024Updated last year
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- T-shirt online designer☆11Aug 16, 2025Updated 8 months ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 3 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- ☆11Jan 22, 2017Updated 9 years ago
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- 京东薅羊毛脚本,自动签到,做任务等docker一键启动。有使用上的问题可以加qq群644989387交流。【以上内容为原作者说明】☆10Feb 8, 2022Updated 4 years ago