An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.
☆10Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for image-steganography
Users that are interested in image-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- select stock automatically, trade manually☆12Jul 26, 2020Updated 5 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- Damn Simple Static url Shortener☆11Oct 16, 2020Updated 5 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- Generative Art NFTs from Genomic Data☆20Oct 11, 2021Updated 4 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- The project that I will participate with in the Microsoft Hack Together hackathon for .NET & Microsoft Graph API☆14Jul 21, 2023Updated 2 years ago
- An application to automate source codes online☆10Dec 23, 2020Updated 5 years ago
- integrate A* path finding algorithm with Placenote SDK for environment understanding☆11Apr 28, 2020Updated 5 years ago
- Image Steganography Using Python and Tkinter☆34Oct 8, 2020Updated 5 years ago
- Build a beautiful landing page with Tailwind CSS☆14May 14, 2019Updated 6 years ago
- A Telegram bot to conduct your ambulatory assessment study by sending surveys to participants' smartphones.☆12Updated this week
- This a theme/template for a custom link in bio website (linktree site) build with Astro☆14Sep 22, 2022Updated 3 years ago
- A Calibre iOS Client.☆14Jan 11, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a Mini App that provides a demo flow for request fictional rides (motorcycle, car, helicopter). User is presented with a map where they c…☆12Aug 6, 2024Updated last year
- Code Repository for Problem Statement SM445 by Team Anton 3.0 ( SIH2020 )☆12Aug 3, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Regression analysis on predicting the temperature of superconducting materials☆10Jan 27, 2019Updated 7 years ago
- Google # Hash Code 2018 Challenge☆31Sep 21, 2018Updated 7 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- My dotfiles.☆19Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Wix Code MLS integration using the RETS protocol☆11Mar 20, 2023Updated 3 years ago
- 🧑⚖️ mStable Governance App☆17Sep 30, 2021Updated 4 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Open API Specification for the NFT APIs☆13Apr 5, 2020Updated 5 years ago
- Online fashion store☆16Jul 29, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago