Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ Steganography
Hidden Data, Audio Watermarking, Image Embedding, Covert Channels
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
181635
posts in
24.2
ms
Provably
Secure
Steganography
Based on List Decoding
🕵️
Steganographic Archives
arxiv.org
·
1d
Steganography
at scale: Embedding share
URLs
in Datadog widget screenshots
🕸️
WebP Analysis
datadoghq.com
·
4d
How Elon Musk, Donald Trump, and
Reza
Pahlavi
can free the Iranians - opinion
🔐
Quantum Cryptography
jpost.com
·
4d
AI to
undo
your AI
writing
🔓
Reverse engineering
sinceerly.com
·
2d
·
Hacker News
,
Hacker News
Provably
Secure Hybrid Inner Product and
Boolean
Masking via Composable Conversion
🌊
Stream Ciphers
eprint.iacr.org
·
5d
Hiding Secrets in the CSI
Quotient
: A Robust Wi-Fi CSI
Steganography
System
🦠
Parasitic Compression
arxiv.org
·
2d
Hacking
🔓
Hacking
minitel.us
·
5d
Data Heist
Scenerio
:
HackViser
🔓
Hacking
medium.com
·
3d
Text
Steganography
with Dynamic
Codebook
and Multimodal Large Language Model
🕵️
Steganographic Archives
arxiv.org
·
2d
Subliminal
Project
🦠
Parasitic Archives
youtube.com
·
4d
Hack
on
📼
Cassette Hacking
nick-black.com
·
3d
Foundations
of
Verifiably
Encrypted (Blind) Signatures
🔱
Galois Cryptography
eprint.iacr.org
·
4d
Splats
in
Splats
++: Robust and Generalizable 3D Gaussian Splatting
Steganography
🕵️
Steganographic Archives
arxiv.org
·
5d
Efficient
Arithmetic-and-Comparison
Homomorphic
Encryption with Space Switching
🔐
Homomorphic Encryption
arxiv.org
·
2d
Hierarchically
Robust
Zero-shot Vision-language Models
📊
Learned Metrics
arxiv.org
·
3d
Stealthy
Backdoor
Attacks against LLMs Based on Natural Style Triggers
🛡️
WASM Sandboxing
arxiv.org
·
1d
Finite-Length Empirical Comparison of Polar, PAC, and Invertible-Extractor Secrecy Codes over the
Wiretap
BSC
📊
Compression Proofs
arxiv.org
·
2d
MATRIX: Multi-Layer Code
Watermarking
via Dual-Channel Constrained
Parity-Check
Encoding
🌊
Stream Ciphers
arxiv.org
·
5d
Stringology
Based
Cryptology
🔐
Cryptographic Archaeology
arxiv.org
·
4d
Audio
Spoof
Detection with
GaborNet
🎵
Audio Hashing
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help