A Library of Audio Steganography & Watermarking Algorithms
-
Updated
Nov 7, 2023 - MATLAB
A Library of Audio Steganography & Watermarking Algorithms
A free online class on network information hiding/steganography/covert channels.
Provably Secure Steganography in Practice Based on “Distribution Copies”
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Implementations of audio watermarking methods, speech quality metrics and attacks in different domains.
Support for modular development with Simulink models
Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
A watermarking/steganography library that can hide a byte sequence (like a text/string) inside a cover text
A small tool to perform password-based LSB image steganography
Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
DCL-204: Java SE 8 Programming
Some simple techniques for information hiding in R5RS Scheme
BBIS (Binary-Based Instruction Substitution) is a novel technique to hide data in executables. This is achieved by changing assembly instructions to equivalent instructions in the executable's code according to binary string of the data to hide.
📨 MonteCarlo-Simulation, STDM, PRG-Box-Muller
It contains pieces of code that show the potential of Python at 360 ° in a didactic way
Desktop application for information hiding using LSB steganography method
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
A java application which takes a file as input and hides it in an image by bit manipulation of RGB and decrypts the text information from the image, has been containerized using Dockerfile (Docker container) built from Openjdk (official) image.
Add a description, image, and links to the information-hiding topic page so that developers can more easily learn about it.
To associate your repository with the information-hiding topic, visit your repo's landing page and select "manage topics."