podkidyshev / cryptographic_methodsLinks
Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, rus)
☆15Updated 7 years ago
Alternatives and similar repositories for cryptographic_methods
Users that are interested in cryptographic_methods are comparing it to the libraries listed below
Sorting:
- Python Steganography data hiding in image☆10Updated 3 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Updated 6 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆12Updated 9 months ago
- Machine learning steganographic image detection.☆15Updated 8 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated 2 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Updated 6 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆18Updated 4 years ago
- Fun exercises on image steganography in Python☆13Updated 8 years ago
- 深度隐写术☆17Updated 5 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆15Updated 4 years ago
- ☆22Updated 3 years ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆13Updated 5 years ago
- 基于Python3_短信轰炸☆12Updated 6 years ago
- Free and open-source SMS/Call bombing application☆20Updated 4 years ago
- Information Security using Steganography over Cryptography☆14Updated last year
- ☆11Updated 5 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 6 years ago
- SMS or Call bombing allows a hacker to send 100s of SMS in a min to the victim. ... Using this tool carelessly will cause a lot of troubl…☆11Updated 4 years ago
- ☆11Updated 9 months ago
- a digital rights management system based on DWT/LSB steganography and blockchain☆15Updated 3 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆18Updated 2 years ago
- Sms Bombing Tool.☆17Updated 4 years ago
- Implementation of several Steganography and steganalysis techniques.☆50Updated last month
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- Bangladeshi Number Unlimited Sms Bombing Tools.☆14Updated 2 years ago
- Video Steganography for Piracy Prevention☆12Updated 9 years ago
- Image steganography and compressing☆14Updated 2 years ago
- An implementation of S-UNIWARD steganography in python