Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstract/document/9478162
☆11Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for LSB-Steganography-using-Pixel-Locator-Sequence-With-AES
Users that are interested in LSB-Steganography-using-Pixel-Locator-Sequence-With-AES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆17Jul 25, 2023Updated 2 years ago
- Code for our research paper VStegNET☆13Nov 22, 2022Updated 3 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆16Mar 25, 2021Updated 5 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Deep Steganalysis training script☆13May 1, 2025Updated 10 months ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- Project for Information assurance and security☆11Dec 7, 2020Updated 5 years ago
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Feb 27, 2021Updated 5 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- using LSB method in python☆17Feb 5, 2022Updated 4 years ago
- Image Steganography Using Python and Tkinter☆34Oct 8, 2020Updated 5 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- This project is based on image steganography using DCT and AES encryption systems.☆18Jun 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Text steganography based on Markov chains☆35Mar 1, 2014Updated 12 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆29Feb 28, 2021Updated 5 years ago
- Steganographic implementation in images, audio and text files☆42Nov 8, 2024Updated last year
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Sample code for DNS spoofing with ARP poisoning.☆21Mar 21, 2015Updated 11 years ago
- Tic Tac Toe Game using Flutter☆10Mar 11, 2020Updated 6 years ago
- MIPS多周期CPU☆11Sep 1, 2020Updated 5 years ago
- A poem generator based on text generation using GRU☆10Jan 14, 2021Updated 5 years ago
- This is the Last Working Google Translate Chrome Extension That Works With Brave etc. DO NOT EVER DOWNLOAD THE UPDATED VERSION!! IF YOU H…☆18Oct 24, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15Mar 2, 2014Updated 12 years ago
- ShareKBM is open source alternative software inspired by applications like synergy and other such applications like ShareMouse which ena…☆15Oct 18, 2020Updated 5 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 9 months ago
- Steganography in java using LSB technique for hiding message in PNG image & using AES and SHA-2 algorithm for encryption/decryption of me…☆20Feb 4, 2011Updated 15 years ago
- 南京航空航天大学计算机专业计算机组成原理,单周期和流水线cpu设计实验相关代码☆13Nov 18, 2020Updated 5 years ago
- ☆24Jan 31, 2020Updated 6 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- ☆19Dec 2, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Sep 13, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- An app to hide text data in a image implementing Steganography with AES algorithm☆33Feb 24, 2021Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆29Jun 20, 2024Updated last year
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago