Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messages.
☆12Mar 27, 2017Updated 8 years ago
Alternatives and similar repositories for steganography
Users that are interested in steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hide Your secret video inside another video☆73Mar 19, 2025Updated last year
- AES 256 & RSA encrypted video steganography. SRU Hackathon 2022 - Cybersecurity Winners☆26Jul 11, 2025Updated 8 months ago
- ☆12Apr 20, 2017Updated 8 years ago
- ☆55Nov 20, 2020Updated 5 years ago
- School Assignment☆32Oct 31, 2020Updated 5 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- python program to hide texts inside a video using LSB transformation☆38Jul 14, 2020Updated 5 years ago
- Live video streaming server built with Sanic framework and opencv-python.☆12Oct 29, 2017Updated 8 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- core code for High-Capacity Convolutional Video Steganography with Temporal Residual Modeling☆64Jun 26, 2021Updated 4 years ago
- Deep Steganalysis training script☆13May 1, 2025Updated 10 months ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- The project that we worked on this summer internship falls in the domain of research in IoT (Internet of Things). Initially, the mentor a…☆26Jun 27, 2018Updated 7 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- This is the whole Code for Person Detection using Aerial surveillance for Human Rescue. In this you can count no of person in an Image or…☆12May 2, 2020Updated 5 years ago
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- ☆22Oct 27, 2025Updated 4 months ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- Figuring out the identity of a person from a video stream, using TensorFlow's Inception v3 Neural Retraining and OpenCV☆16Feb 21, 2019Updated 7 years ago
- IoT Raspberry Pi security camera running open-cv for object detection. The camera will send an email with an image of any objects it dete…☆19May 7, 2020Updated 5 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- scene classification for 360 photos☆12Jun 29, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- A repository for the Major Project for the Case Studies Course☆25May 28, 2024Updated last year
- I really hate phishing. With this tool you can send multiple fake emails and password to phishers. It executes HTTP POST requests on the …☆27Oct 13, 2018Updated 7 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 9 months ago
- [AAAI 2024] Direction-aware Video Demoiréing with Temporal-guided Bilateral Learning☆14Dec 13, 2023Updated 2 years ago
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago