dennis-tra / image-stegoLinks
🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on its own.
☆105Updated 3 years ago
Alternatives and similar repositories for image-stego
Users that are interested in image-stego are comparing it to the libraries listed below
Sorting:
- ☆108Updated 3 years ago
- Cryptographically time-lock your files.☆25Updated last year
- ☆74Updated 2 years ago
- An end-to-end opensource password manager☆120Updated 3 years ago
- Convert a Video to an Animated Flipbook using OpenCV☆46Updated 5 years ago
- Passwords Fountain - modern & performant password manager interface which works everywhere☆64Updated 2 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 3 years ago
- Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS☆91Updated 2 months ago
- A generator for OpenAPI 3☆97Updated 4 years ago
- ☆114Updated 4 years ago
- Basic Pub/Sub over HTTP/S☆24Updated 3 years ago
- ☆75Updated 5 years ago
- ☆120Updated 3 years ago
- My coding environments.☆31Updated 2 months ago
- Find the safest well lit walking path between two locations on earth.☆125Updated 2 years ago
- ☆145Updated last year
- Dynamic DNS for Cloudflare using Google STUN Servers☆59Updated 5 years ago
- get more done with fewer keystrokes☆57Updated 2 years ago
- Display last GitLab project git commit. Page is optimized for an e-paper device.☆36Updated 4 years ago
- End-to-end encrypted notes application☆122Updated 3 years ago
- MetaMate is an open-source semantic service bus and provides you an api for everything☆96Updated 2 years ago
- Takes an IPFS hash, converts it to HLS (Apple's HTTP Live Streaming) and reuploads the file to IPFS, requires docker☆30Updated 6 years ago
- α-Indirect Control in Onion-like Networks☆148Updated last year
- Easy log aggregation, indexing and searching☆169Updated 8 months ago
- Transmit large files over lossy networks using Raptor fountain codes☆63Updated 6 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆63Updated 4 years ago
- type with your voice on Mac/Windows/Linux using electronjs and google chrome☆41Updated 4 years ago
- Go implementation of MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams☆188Updated 5 years ago
- Image AES256 crypt-decrypt☆39Updated 3 years ago
- copy and paste across machines☆109Updated 3 years ago