🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💧 Digital Watermarking

Steganography, Copyright Protection, Archive Authentication, Invisible Metadata

AI Watermarks: Guarding Your Million-Dollar Machines Against Data Hijackers
dev.to·2d·
Discuss: DEV
🕵️Vector Smuggling
Show HN: Storing private blogs on public internet with 0 verifications
sgaud.com·7h·
Discuss: Hacker News
🏠Personal Archives
(Un)Fairlicensing ANP aka License Trolling
zylstra.org·4h
🕸️WebP Analysis
Nexar dashcam video database hacked
malwarebytes.com·1h
🔓Hacking
Modern C, C23 edition, now in print
gustedt.wordpress.com·8h
✅Format Verification
Disintegration Fingerprinting: A low-cost, easy tool to identify fake medicines
medrxiv.org·1d·
Discuss: Hacker News
🔬Binary Analysis
Intuitions about records management for data scientists
thinkingrecords.co.uk·21h
🔗Data Provenance
Secure Password Generator Based on Secure Pseudo-Random Number Generator
arxiv.org·1d
🔓Password Cracking
From image Upload to Workspace Takeover: Deconstructing a Critical Stored XSS Attack
infosecwriteups.com·12h
🔓Hacking
This Week in Security: DNS Oops, Novel C2s, and the Scam Becomes Real
hackaday.com·4h
🌐DNS Security
Fractal Compression
en.wikipedia.org·2h·
Discuss: Hacker News
🌀Fractal Compression
Can Coding Be Both Lossless and Private?
hackernoon.com·2d
🔐Privacy Codecs
Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure
tenable.com·5h
🌐Network Security
Interfacing Micro SD Card Module with Arduino
hackster.io·7h
🎮Game Cartridge Dumps
A Guide to Creative Automation with CE.SDK & Javascript
img.ly·7h
🤖Archive Automation
Enhancing Robustness in Post-Processing Watermarking: An Ensemble Attack Network Using CNNs and Transformers
arxiv.org·1d
🔍Vector Forensics
Establishing a Centralized and Automated System for Classification Review
transforming-classification.blogs.archives.gov·1d
📄Document Digitization
Investigating a Mysteriously Malformed Authenticode Signature
elastic.co·1d
🧪Binary Fuzzing
The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan
dev.to·2d·
Discuss: DEV
🔍Vector Forensics
Help me consolidate these video capture systems using old servers!
preview.redd.it·21h·
Discuss: r/homelab
🎬Video Codecs
Loading...Loading more...
AboutBlogChangelogRoadmap