A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Mar 16, 2023Updated 3 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆21Nov 23, 2019Updated 6 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) st…☆33Oct 3, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Compressed sensing recovery methods☆12Nov 8, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Matlab Code for Image compressive sensing recovery using adaptively learned sparsifying basis via L0 minimization☆12Jun 26, 2018Updated 7 years ago
- Code developed during my Master's thesis, testing various Compressed Sensing based reconstructions☆14Jun 9, 2014Updated 11 years ago
- Sentiment Analysis based on images and text☆13Feb 14, 2016Updated 10 years ago
- image Encryption☆12Apr 25, 2017Updated 9 years ago
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆12Oct 29, 2019Updated 6 years ago
- The Demo of Caiafa's paper: Multidimensional compressed sensing and their applications. Because we can not open MEGA in P. R. China, the …☆18Apr 21, 2018Updated 8 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reversible data hiding with automatic brightness contrast enhancement. This repository contains the code from IEEE paper https://ieeexplo…☆18Apr 22, 2021Updated 5 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Codes related to our paper "Sparse Polynomial Chaos Expansions via D-optimal Designs and Compressed Sensing." https://www.sciencedirect.…☆20Jun 14, 2019Updated 6 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Bayesian Convolutional Neural Networks for Compressed Sensing Restoration☆20Nov 14, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Canari local transforms pcap file analysis☆30Apr 14, 2014Updated 12 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 11 years ago
- Stargate☆96Aug 6, 2016Updated 9 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ConnectWise-CRU☆14Mar 11, 2024Updated 2 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 4 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago