hmoraldo / markovTextStego
Text steganography based on Markov chains
☆32Updated 10 years ago
Alternatives and similar repositories for markovTextStego:
Users that are interested in markovTextStego are comparing it to the libraries listed below
- Machine learning steganographic image detection.☆14Updated 8 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆18Updated 5 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆9Updated 3 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 5 years ago
- ☆31Updated 2 years ago
- PDF Malware Parser☆20Updated 8 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Updated 5 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 9 years ago
- A steganalysis tool for detecting LSB steganography in images☆210Updated 6 years ago
- A library for adversarial classifier evasion☆40Updated 10 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Updated 5 years ago
- An open-source toolbox for steganalysis☆165Updated last month
- Implementation of several Steganography and steganalysis techniques.☆45Updated last year
- WhatsApp statistics toolkit mirror☆10Updated 5 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated 2 years ago
- a python implement of f5 steganography☆44Updated 12 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆11Updated 7 years ago
- Hard-to-detect image steganography☆31Updated 2 weeks ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- ☆26Updated 3 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- ☆11Updated 4 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated last year
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆9Updated 6 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- Invisible Unicode Messages☆25Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆44Updated 15 years ago