A Library of Audio Steganography & Watermarking Algorithms
-
Updated
Nov 7, 2023 - MATLAB
A Library of Audio Steganography & Watermarking Algorithms
A free online class on network information hiding/steganography/covert channels.
Provably Secure Steganography in Practice Based on “Distribution Copies”
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Implementations of audio watermarking methods, speech quality metrics and attacks in different domains.
Collection of my network covert channel tools.
A watermarking/steganography library that can hide a byte sequence (like a text/string) inside a cover text
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Support for modular development with Simulink models
Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.
A small tool to perform password-based LSB image steganography
A comprehensive toolkit for steganography and steganalysis. stegano-sec enables users to hide, extract, and analyze hidden data within images, audio, and other files. With support for multiple algorithms and detection techniques, it is suitable for security researchers, CTF participants, and anyone interested in information hiding.
Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
Some simple techniques for information hiding in R5RS Scheme
MIRROR of https://codeberg.org/catseye/define-opaque : R5RS Scheme macro for defining opaque datatypes
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
DCL-204: Java SE 8 Programming
📨 MonteCarlo-Simulation, STDM, PRG-Box-Muller
Unlock the world of clandestine communication with Python's XOR cipher, enabling the concealment and revelation of messages through sophisticated encryption and decryption techniques.
It contains pieces of code that show the potential of Python at 360 ° in a didactic way
Add a description, image, and links to the information-hiding topic page so that developers can more easily learn about it.
To associate your repository with the information-hiding topic, visit your repo's landing page and select "manage topics."