The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
-
Updated
Apr 20, 2024 - Jupyter Notebook
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
Desktop application for information hiding using LSB steganography method
A java application which takes a file as input and hides it in an image by bit manipulation of RGB and decrypts the text information from the image, has been containerized using Dockerfile (Docker container) built from Openjdk (official) image.
MIRROR of https://codeberg.org/catseye/define-opaque : R5RS Scheme macro for defining opaque datatypes
Steganography for hiding information in BMP images
Some simple techniques for information hiding in R5RS Scheme
BBIS (Binary-Based Instruction Substitution) is a novel technique to hide data in executables. This is achieved by changing assembly instructions to equivalent instructions in the executable's code according to binary string of the data to hide.
📨 MonteCarlo-Simulation, STDM, PRG-Box-Muller
It contains pieces of code that show the potential of Python at 360 ° in a didactic way
DCL-204: Java SE 8 Programming
Network Environment Learning (NEL) Phase for Covert Channels (with a Feedback Channel)
A small tool to perform password-based LSB image steganography
Implementations of audio watermarking methods, speech quality metrics and attacks in different domains.
Support for modular development with Simulink models
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.
Provably Secure Steganography in Practice Based on “Distribution Copies”
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
Add a description, image, and links to the information-hiding topic page so that developers can more easily learn about it.
To associate your repository with the information-hiding topic, visit your repo's landing page and select "manage topics."