Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images
☆22Jun 25, 2022Updated 3 years ago
Alternatives and similar repositories for pvd_steganography
Users that are interested in pvd_steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Sep 19, 2024Updated last year
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- Encrypt and decrypt text and files with AES and RSA encryption and image steganography.☆15Oct 10, 2023Updated 2 years ago
- A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms…☆22Sep 1, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple steganography example of concealing a hidden messages in an image file.☆13Jun 11, 2017Updated 8 years ago
- Android Password Card Generator Application☆14Jan 11, 2017Updated 9 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- Least-Significant-Bit tool for steganography☆79Jun 21, 2018Updated 7 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- ☆10Apr 9, 2020Updated 5 years ago
- pynomo documentation☆18Oct 22, 2023Updated 2 years ago
- Image Steganography Using Python and Tkinter☆34Oct 8, 2020Updated 5 years ago
- “秘隐”-图像隐写系统,基于隐写算法完成文本信息的隐藏与提取、单张图片的隐藏与提取,并基于PyQt5完成了项目的可视化界面演示,用于信息的安全保护。☆48Jan 22, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Deep residual network for steganalysis of digital images☆20Aug 1, 2023Updated 2 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- in-browser playground for mtcute!☆20Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Statically evaluate AST branches, return optimized tree.☆11Apr 14, 2017Updated 8 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- JJS Judging system☆12Mar 20, 2026Updated last week
- Siamese Network implementation using Chainer☆37Oct 26, 2015Updated 10 years ago
- Python program to steganography files into images using the Least Significant Bit.☆951Aug 11, 2022Updated 3 years ago
- A gemini server implementation for the ESP8266☆15Jan 21, 2023Updated 3 years ago
- A 3rd-party implemented Face-Xray for deepfake detection.☆13Jun 2, 2020Updated 5 years ago
- ☆13Jan 30, 2019Updated 7 years ago
- Telegram Bot based on Django☆23Nov 22, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 1J1c7eML6uMwDU4uiKbKRxoqxGP6WMFMvb☆10Feb 18, 2019Updated 7 years ago
- Executable memory allocator with support for dual mapping and W^X protection☆13Jul 6, 2023Updated 2 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- A JavaScript port of the Vineflower decompiler.☆14Feb 27, 2026Updated last month
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆14Oct 17, 2022Updated 3 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Image Processing and feature detection are the two most important areas of research in Computer Vision. In our one year project we succes…☆12Jul 26, 2017Updated 8 years ago