hmoraldo / markovTextStego
Text steganography based on Markov chains
☆32Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for markovTextStego
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆55Updated 5 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆9Updated 3 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆16Updated 4 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆11Updated 7 years ago
- Hard-to-detect image steganography☆30Updated 7 months ago
- a python implement of f5 steganography☆44Updated 12 years ago
- Hiding Images within other images using Deep Learning☆201Updated 6 years ago
- Machine learning steganographic image detection.☆14Updated 7 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆25Updated 5 years ago
- A steganalysis tool for detecting LSB steganography in images☆201Updated 6 years ago
- Python steganography tool to hide images or text in images☆440Updated 5 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆16Updated 4 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Updated 5 years ago
- Fun exercises on image steganography in Python☆13Updated 7 years ago
- An open-source toolbox for steganalysis☆161Updated 2 weeks ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Updated 5 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated last year
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 5 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆14Updated last year
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆25Updated 3 months ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆59Updated 4 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 9 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆63Updated 6 years ago
- 深度隐写术☆15Updated 4 years ago
- Implementation of several Steganography and steganalysis techniques.☆44Updated last year
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Updated last year
- IStego100K: Large-scale Image Steganalysis Dataset☆62Updated 4 years ago