REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·2d
🕵️Steganographic Archives
Flag this post
Why wavelets is a bad choice for image coding
codecs.multimedia.cx·2d
📊Rate-Distortion Theory
Flag this post
This Unbreakable CIA Cipher Fooled the World for 37 Years. Then Two People Accidentally Solved It.
popularmechanics.com·5h
🔐Cryptographic Archaeology
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️eBPF Security
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
🔒Hardware Attestation
Flag this post
The Smallest PNG
📸PNG Optimization
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·1d
🔐Hash Functions
Flag this post
Recovering Data from the OceanGate depths
hackaday.com·20h
⚡Circuit Archaeology
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.com·3d
🔍Audio Forensics
Flag this post
I built a JBOD from a dead r710
⚡Circuit Archaeology
Flag this post
Text rendering and effects using GPU-computed distances
blog.pkh.me·4h
📐Mathematical Art
Flag this post
Word and PowerPoint Alt Text Roundup
webaim.org·1d
📄PostScript
Flag this post
Text case changes the size of QR codes
johndcook.com·1d
📱QR Archaeology
Flag this post
Enhancing ECG Classification Robustness with Lightweight Unsupervised Anomaly Detection Filters
arxiv.org·1d
🧠Machine Learning
Flag this post
Suspect disguised himself as a woman to record people in gym locker room, cops say
the-independent.com·2d
🔍Tape Forensics
Flag this post
Loading...Loading more...