dennis-tra / image-stegoLinks
🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on its own.
☆106Updated 4 years ago
Alternatives and similar repositories for image-stego
Users that are interested in image-stego are comparing it to the libraries listed below
Sorting:
- Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS☆91Updated 9 months ago
- α-Indirect Control in Onion-like Networks☆148Updated 2 years ago
- ☆108Updated 4 years ago
- Cryptographically time-lock your files.☆25Updated 2 years ago
- ☆115Updated 4 years ago
- ☆73Updated 3 years ago
- Get Your 3D Printed High Security Key☆147Updated 4 years ago
- Convert a Video to an Animated Flipbook using OpenCV☆45Updated 5 years ago
- Open source Uber PoC #deleteuber☆92Updated 5 years ago
- type with your voice on Mac/Windows/Linux using electronjs and google chrome☆41Updated 4 years ago
- Find the safest well lit walking path between two locations on earth.☆124Updated 3 years ago
- ☆120Updated 3 years ago
- ☆143Updated last year
- Web on top of any protocol☆113Updated 5 years ago
- End-to-end encrypted notes application☆122Updated 3 years ago
- An end-to-end opensource password manager☆120Updated 4 years ago
- Reproduce parallax effect for an user whose point of view is tracked by a camera☆70Updated 5 years ago
- A generator for OpenAPI 3☆97Updated 5 years ago
- Passwords Fountain - modern & performant password manager interface which works everywhere☆65Updated 3 years ago
- A Node.js REPL with built-in GPT3 completion☆13Updated 2 years ago
- A light version of Tor portable to the browser☆120Updated 5 years ago
- PUREE: Password-based Uniform-Random-Equivalent Encryption☆64Updated 5 years ago
- ☆75Updated 5 years ago
- Transmit large files over lossy networks using Raptor fountain codes☆64Updated 6 years ago
- Basic Pub/Sub over HTTP/S☆24Updated 4 years ago
- ☆38Updated 3 years ago
- Easy log aggregation, indexing and searching☆170Updated 5 months ago
- Go implementation of MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams☆188Updated 5 years ago
- get more done with fewer keystrokes☆57Updated 3 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 4 years ago