It is a way to embedding two secret images onto one carrier image. Uses frequency magnitude modulation.
☆14May 22, 2025Updated 9 months ago
Alternatives and similar repositories for rubies-steganography
Users that are interested in rubies-steganography are comparing it to the libraries listed below
Sorting:
- A MicroPython framework that takes care of cellular communication with variety of built-in IoT cloud solutions.☆22May 21, 2025Updated 10 months ago
- An open-source Zephyr smartwatch firmware developed for Waveshare's ESP32-S3-Touch-LCD-1.28.☆17Oct 12, 2025Updated 5 months ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- Image-Steganography-LSB is a command-line application that enables users to perform steganography using the Least Significant Bit (LSB) a…☆24Mar 1, 2025Updated last year
- Marmara University Graduation Project/Thesis☆14May 5, 2022Updated 3 years ago
- Resilient watermarking of digital images☆20Mar 4, 2026Updated 2 weeks ago
- ☆16Jan 5, 2026Updated 2 months ago
- Doom ported to EFR32xG24 and MGM240x devices, with BLE multiplayer☆14Oct 1, 2024Updated last year
- User documentation for VisUAL2 tool☆22Jan 4, 2024Updated 2 years ago
- Lora SX1276/7/8 module driver interfacing with STM32F103C8 bluepill. Keil Software code with HAL library☆11Jun 1, 2021Updated 4 years ago
- We Need No Pixels: Video Manipulation Detection Using Stream Descriptors☆10Oct 4, 2019Updated 6 years ago
- TS3Tunnel is a proof of concept showing how easy it is to spy on the private audio communications of the TeamSpeak 3 users without anyone…☆13Nov 30, 2018Updated 7 years ago
- Ray tracing is a rendering technique for generating an image by tracing the path of light.☆12Sep 9, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Real-Time Operating System (RTOS) for Xilinx Zynq-7000 Cortex-A9 (ARMv7-A) multi-core SoCs (ZedBoard, PicoZed, MicroZed and similars) bas…☆15Aug 10, 2023Updated 2 years ago
- A watermarking/steganography library that can hide a byte sequence (like a text/string) inside a cover text☆18Updated this week
- Encrypt files & Hide encrypted data☆19Mar 14, 2026Updated last week
- Plugin to support creating and developing Mbed OS projects in CLion☆10May 28, 2021Updated 4 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆13Updated this week
- ☆11Dec 8, 2020Updated 5 years ago
- PORTGPT: Towards Automated Backporting Using Large Language Models(IEEE S&P2026)☆34Feb 27, 2026Updated 3 weeks ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- mbed-os port of LittleVGL☆14May 15, 2020Updated 5 years ago
- Hard-to-detect image steganography☆52Feb 8, 2025Updated last year
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- DHCP/NFS/TFTP server in a Docker container based on Alpine Linux☆14May 16, 2019Updated 6 years ago
- A simple C++ OBD-II library that reads commands from a configuration file.☆14Jul 30, 2014Updated 11 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆18Jul 3, 2022Updated 3 years ago
- Portable electronic device to measure air and noise pollution☆12Feb 21, 2020Updated 6 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- A simple - relatively - small dictionary of words.☆34Jun 6, 2021Updated 4 years ago
- Implementation of Mask R-CNN architecture, one of the object recognition architectures, on a custom dataset.☆10Nov 1, 2022Updated 3 years ago
- Containerized RPi camera stream server. Optionally connect a USB microphone for audio.☆13Feb 9, 2019Updated 7 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Ethical Hacking - Useful Resources☆20Oct 23, 2025Updated 4 months ago