schroederdewitt / perfectly-secure-steganographyView external linksLinks
Contains open source code for the paper "Perfectly-secure Steganography using Minimum Entropy Coupling"
☆62Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for perfectly-secure-steganography
Users that are interested in perfectly-secure-steganography are comparing it to the libraries listed below
Sorting:
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 8 months ago
- ☆27Sep 9, 2021Updated 4 years ago
- ☆12Mar 3, 2025Updated 11 months ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Pulsar: Secure Steganography for Diffusion Models☆14Oct 15, 2024Updated last year
- ☆15Jun 26, 2023Updated 2 years ago
- a digital rights management system based on DWT/LSB steganography and blockchain☆15Nov 14, 2022Updated 3 years ago
- Provably Secure Steganography☆14Sep 13, 2025Updated 5 months ago
- Code for minimum-entropy coupling.☆32Jan 6, 2026Updated last month
- ☆33Nov 3, 2022Updated 3 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆17Oct 3, 2023Updated 2 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆19Mar 7, 2023Updated 2 years ago
- Hide data in plaintext☆16Mar 25, 2019Updated 6 years ago
- ☆19Sep 27, 2021Updated 4 years ago
- Learning Iterative Neural Optimizers for Image Steganography☆23Jun 24, 2025Updated 7 months ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- Invisible Unicode Messages☆26Aug 27, 2015Updated 10 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆26Apr 21, 2021Updated 4 years ago
- Hide Your secret video inside another video☆73Mar 19, 2025Updated 10 months ago
- Read-only mirror of https://git.hloth.dev/hloth/vfs-status-bot☆10Jul 14, 2025Updated 7 months ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated 11 months ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Fully Local Push-to-Transcribe☆16Nov 6, 2025Updated 3 months ago
- 🔒 World's most secure P2P messenger. End-to-end encrypted, zero-server architecture, quantum-resistant roadmap. WebRTC direct connection…☆24Jan 7, 2026Updated last month
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- Booking an Appointment using Selenium and Telebot in Python☆10Jul 8, 2021Updated 4 years ago
- n8n Templates in JSON☆16Feb 9, 2025Updated last year
- Анализатор логов 3x-ui на Python с поддержкой фильтрации и детектирования торрентов.☆13Dec 8, 2024Updated last year
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- Crypto coin mixer☆10Feb 14, 2018Updated 8 years ago
- 🌟Implementation of graph modeling in peer-to-peer (P2P) networks utilizing blockchain technology via WebSocket protocols.☆15Nov 12, 2025Updated 3 months ago
- A MCP server to interact with Kalshi prediction markets☆16Jan 24, 2026Updated 3 weeks ago
- ☆10Mar 4, 2024Updated last year
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago