An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: information-hiding

FraunhoferISST/Innamark

A watermarking/steganography library that can hide a byte sequence (like a text/string) inside a cover text

Language: Kotlin - Size: 4.3 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 11 - Forks: 1

cdpxe/Network-Covert-Channels-A-University-level-Course

A free online class on network information hiding/steganography/covert channels.

Size: 47.7 MB - Last synced at: 9 days ago - Pushed at: 13 days ago - Stars: 99 - Forks: 10

cdpxe/NetworkCovertChannels

Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.

Language: C - Size: 394 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 16 - Forks: 5

ktekeli/audio-steganography-algorithms

A Library of Audio Steganography & Watermarking Algorithms

Language: MATLAB - Size: 3.63 MB - Last synced at: 14 days ago - Pushed at: over 1 year ago - Stars: 266 - Forks: 71

cpressey/Information-Hiding-in-Scheme

Some simple techniques for information hiding in R5RS Scheme

Language: Scheme - Size: 6.84 KB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

lucianoscarpaci/cipher

Unlock the world of clandestine communication with Python's XOR cipher, enabling the concealment and revelation of messages through sophisticated encryption and decryption techniques.

Language: Python - Size: 4.88 KB - Last synced at: about 1 month ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

pawel-kaczmarek/The-A-Files

Implementations of audio watermarking methods, speech quality metrics and attacks in different domains.

Language: Python - Size: 17.7 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 17 - Forks: 5

cdpxe/CCEAP

The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.

Language: C - Size: 4.5 MB - Last synced at: 9 days ago - Pushed at: 6 months ago - Stars: 14 - Forks: 3

cdpxe/NELphase

Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)

Language: C - Size: 95.7 KB - Last synced at: 9 days ago - Pushed at: 6 months ago - Stars: 3 - Forks: 1

ericyoc/gencyber_10_sec_principles_poc

The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity

Language: Jupyter Notebook - Size: 40 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 0 - Forks: 0

sajjadhasann/Information-Hiding

The practical code of Information Hiding course lab

Language: Python - Size: 6.54 MB - Last synced at: 14 days ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

cdpxe/nefias

Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection

Language: Shell - Size: 65.5 MB - Last synced at: 20 days ago - Pushed at: 11 months ago - Stars: 27 - Forks: 9

MrKonstantinSh/Info-Hider

Desktop application for information hiding using LSB steganography method

Language: C++ - Size: 52.7 KB - Last synced at: 12 months ago - Pushed at: about 5 years ago - Stars: 0 - Forks: 0

deepcloudlabs/dcl204-2019-dec-16

DCL-204: Java SE 8 Programming

Language: Java - Size: 147 KB - Last synced at: 14 days ago - Pushed at: over 5 years ago - Stars: 2 - Forks: 3

birg81/python.wideprogramming

It contains pieces of code that show the potential of Python at 360 ° in a didactic way

Language: Python - Size: 7.81 KB - Last synced at: 21 days ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 0

catseye/define-opaque

MIRROR of https://codeberg.org/catseye/define-opaque : R5RS Scheme macro for defining opaque datatypes

Language: Scheme - Size: 6.84 KB - Last synced at: about 2 months ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

comydream/Discop

Provably Secure Steganography in Practice Based on “Distribution Copies”

Language: Python - Size: 2.32 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 9 - Forks: 0

daniel752/BBIS

BBIS (Binary-Based Instruction Substitution) is a novel technique to hide data in executables. This is achieved by changing assembly instructions to equivalent instructions in the executable's code according to binary string of the data to hide.

Language: Python - Size: 3.21 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

McSCert/Simulink-Module

Support for modular development with Simulink models

Language: MATLAB - Size: 6.83 MB - Last synced at: about 2 years ago - Pushed at: over 3 years ago - Stars: 7 - Forks: 0

ra1nb0rn/lsb_image_stego

A small tool to perform password-based LSB image steganography

Language: Python - Size: 95.7 KB - Last synced at: about 2 years ago - Pushed at: about 5 years ago - Stars: 2 - Forks: 1

skyleaworlder/inf-OH-ide

:incoming_envelope: MonteCarlo-Simulation, STDM, PRG-Box-Muller

Language: C++ - Size: 5.51 MB - Last synced at: about 2 months ago - Pushed at: about 4 years ago - Stars: 1 - Forks: 1

tianyu-su/Embed2img

embed secret information to image

Language: C++ - Size: 4.33 MB - Last synced at: about 2 years ago - Pushed at: over 5 years ago - Stars: 0 - Forks: 0

Related Keywords
information-hiding 22 steganography 13 infosec 5 covert-channel 4 network-security 3 information-security 3 python 3 research-tool 3 encapsulation 3 network-steganography 3 research-project 2 research-paper 2 scientific-publications 2 security 2 network 2 stego 2 audio-steganography 2 steganography-algorithms 2 lsb-steganography 2 lsb 2 inheritance 2 wav 2 abstract-data-type 2 abstract-data-types 2 oop 2 r5rs-scheme 2 network-forensics 2 modularity 2 watermarking 2 patterns 2 data-hiding 2 hiding-patterns 2 high-cohesion-loose-coupling 1 encryption 1 simplicity 1 java-8 1 java-io 1 java-se 1 java-se8 1 security-first-principles 1 resource-encapsulation 1 process-isolation 1 lambda-expressions 1 aop 1 anomaly-detection 1 least-significant-bit 1 bash 1 covert-channels 1 info-hider 1 shell-scripts 1 shell 1 distributed-computing 1 linux 1 network-covert-channels 1 scientific-research 1 network-monitoring 1 networks 1 scientific-computations 1 nio2 1 opcode-manipulation 1 reverse-engineering 1 decomposition 1 interface 1 mathworks-matlab-scripts 1 model-based-development 1 module 1 phd-project 1 simulink 1 simulink-model 1 simulink-toolbox 1 software-engineering 1 image-steganography 1 image-steganography-tool 1 monte-carlo-simulation 1 random-generation 1 stdm 1 image-processing 1 oop-principles 1 open-closed-principle 1 polymorphism 1 stream-api 1 stream-api-exercises 1 stream-api-java8 1 args-parser 1 list-comprehensions 1 polimorphism 1 socket-programming 1 define-syntax 1 fits-on-a-page 1 opaque-type 1 assembly-x86 1 data-hiding-in-executables 1 executables 1 information-extraction 1 instruction-subtitution 1 protocol-hopping 1 protocol-hopping-covert-channels 1 protocol-switching-covert-channels 1 scientific-software 1 secret-sharing 1