A Library of Audio Steganography & Watermarking Algorithms
-
Updated
Nov 7, 2023 - MATLAB
A Library of Audio Steganography & Watermarking Algorithms
A free online class on network information hiding/steganography/covert channels.
Provably Secure Steganography in Practice Based on “Distribution Copies”
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Implementations of audio watermarking methods, speech quality metrics and attacks in different domains.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.
Support for modular development with Simulink models
A watermarking/steganography library that can hide a byte sequence (like a text/string) inside a cover text
A small tool to perform password-based LSB image steganography
Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
DCL-204: Java SE 8 Programming
Some simple techniques for information hiding in R5RS Scheme
BBIS (Binary-Based Instruction Substitution) is a novel technique to hide data in executables. This is achieved by changing assembly instructions to equivalent instructions in the executable's code according to binary string of the data to hide.
📨 MonteCarlo-Simulation, STDM, PRG-Box-Muller
It contains pieces of code that show the potential of Python at 360 ° in a didactic way
Desktop application for information hiding using LSB steganography method
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
Add a description, image, and links to the information-hiding topic page so that developers can more easily learn about it.
To associate your repository with the information-hiding topic, visit your repo's landing page and select "manage topics."