DEV Community

# steganography

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Perfect Pixel Recovery: Implementing Bayesian Neural Networks for Reversible Steganography 🕵️‍♂️

Perfect Pixel Recovery: Implementing Bayesian Neural Networks for Reversible Steganography 🕵️‍♂️

Comments
3 min read
Hiding in the Bits: Mastering AMBTC Steganography with Combination Theory

Hiding in the Bits: Mastering AMBTC Steganography with Combination Theory

Comments
3 min read
Hidden in Plain Sight: Implementing StegoPNet for Deep Image Steganography 🚀

Hidden in Plain Sight: Implementing StegoPNet for Deep Image Steganography 🚀

Comments
3 min read
Scaling Stealth: Massive Capacity Upgrades for Coverless Steganography with E-CIHMSB and CB-CIHMSB 🕵️‍♂️📈

Scaling Stealth: Massive Capacity Upgrades for Coverless Steganography with E-CIHMSB and CB-CIHMSB 🕵️‍♂️📈

Comments
3 min read
Tripling Data Capacity: Implementing CIHLHF Coverless Steganography in Python 🕵️‍♂️🚀

Tripling Data Capacity: Implementing CIHLHF Coverless Steganography in Python 🕵️‍♂️🚀

Comments
4 min read
I built a tool to stop metadata loss: IPMD (Image Pixel Metadata)

I built a tool to stop metadata loss: IPMD (Image Pixel Metadata)

Comments
1 min read
Hiding in Plain Sight: Building Coverless Steganography (CIHMSB) with Python 🕵️‍♂️🐍

Hiding in Plain Sight: Building Coverless Steganography (CIHMSB) with Python 🕵️‍♂️🐍

2
Comments
5 min read
From Pixels to Payload: LSB Steganography and In-Memory Execution

From Pixels to Payload: LSB Steganography and In-Memory Execution

Comments
4 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Comments
7 min read
PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation

PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation

Comments
15 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.