Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstract/document/9478162
☆11Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for LSB-Steganography-using-Pixel-Locator-Sequence-With-AES
Users that are interested in LSB-Steganography-using-Pixel-Locator-Sequence-With-AES are comparing it to the libraries listed below
Sorting:
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- Deep Steganalysis training script☆13May 1, 2025Updated 10 months ago
- Code for our research paper VStegNET☆13Nov 22, 2022Updated 3 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆16Mar 25, 2021Updated 4 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆17Jul 25, 2023Updated 2 years ago
- An official implementation of the paper "Addressing Segmentation Ambiguity in Neural Linguistic Steganography"☆14Nov 12, 2022Updated 3 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 8 months ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Sep 13, 2020Updated 5 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated last year
- Text steganography based on Markov chains☆35Mar 1, 2014Updated 12 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆28Feb 28, 2021Updated 5 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Image Steganography Using Python and Tkinter☆33Oct 8, 2020Updated 5 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Steganographic implementation in images, audio and text files☆42Nov 8, 2024Updated last year
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Feb 27, 2021Updated 5 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Accompanying ION-ITM-2020 paper "Robust GNSS Estimation using Factor Graphs, Modified Gaussian Mixture Model and a Transformed Domain Met…☆10Feb 7, 2020Updated 6 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago