Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews

  • Acronis True Image for Mac   (Henry)

    Takes full backup of a Mac system which includes saved files and folder plus installed apps.

  • Lodgit Desk Hotel Software for Mac   (Arnold)

    I run a small guest house in Nepal where this software is in use for last two years, we felt this is good enough for any...

  • XolidoSign   (Zico)

    Allows me to insert signature on any document automatically before dispatching, other software requires manual instruction.

  • Wurlie   (Tenesy)

    Make unlimited number of short urls with this script without knowing much about processes that take place in background.

  • Start Hotspot   (heltvet)

    You may turn your android phone to a wifi hotspot but your data may be misused unless you have some sort of control over...

  • NCheck Bio Attendance Trial for Windows   (Jeusme)

    The system is implemented in my office premises, it maintains the employees in and out time accurately, helps the accounts...

  • FirePlotter   (Kacper)

    Monitors all in-coming and outgoing traffic to your PC, also shows the consumed bandwidth to calculate internet bill.

  • FolderMill   (Fairyn)

    FolderMill is an automation software which looks for incoming files and send them to printer by filtering as per your...

  • DocuVieware   (Sigfrid)

    Fully featured document viewer which can be added in your page to load and read almost any type files, the software can...

  • Kiosk Software   (Emmerentiana)

    Restricts access to the public computers and kiosks to prevent changes or viruses from affecting it, hence you need no...


Steganography Algorithms

From Title
Show: All Software | Free Software Only | Mobile Software Only
1.  String algorithms in J2ME - Utilities/Other Utilities
... Project that will provide implementations in Java's Micro Edition (J2ME) platform of algorithms on strings, for exact/inexact matching, similarity distances, among others. ...
 








2.  Java Generic algorithms - Utilities/Mac Utilities
... jga is a functors library, intented to exploit functors as a design and implementation tool. jga adapts functors from C++, adds functors natural for java, and allows basic functors to be combined into compound structures to implement extended logic. ...
 
3.  Evolutionary algorithms Collection - Utilities/Mac Utilities
... A java implementation of several evolutionary algorithms as part of the Unified Algorithm Collection developed by Jonatan Gomez ...
 
4.  salgo - sorting algorithms - Utilities/Other Utilities
... This project is no longer supported by its creators. salgo is a C framework you can use to implement sorting algorithms. It provides different ways of filling an array and then sorting this in ascending or descending order (a stop watch is included). ...
 
5.  Operative Capacity algorithms - Utilities/Other Utilities
... Operative capacity algorithms for crude oil transportation in pipe networks coded in Python. ...
 




6.  Genetic algorithms Engine - Blackjack - Utilities/Other Utilities
... This project is a Genetic Algorithm engine able to be reused for other projects with minimal additional programming. To use GA to search for a problems solution, program a fitness function, the project settings, and a few virtual functions. ...
 
7.  1-2- Free steganography - Home & Personal/Misc
... 1-2- Free steganography Invisible Secrets allows you to encrypt and hide files in other files (carriers) which are not suspect of encryption (JPG, PNG, BMP). First, It will encrypt the sensitive data using a specified password and cryptosystem (algorithm). After that, the encrypted data will be inserted in the carrier. The resulted carrier (which contains the real message) can be attached to an email message (which is a fake message), or published on a web page near hundreds of other pictures ...
 
8.  Picture steganography - Utilities/Other Utilities
... This application design for hide data into bmp file . in fact this application is a steganography Program ...
 
9.  !steganography Processor - Security/Encryption Tools
... AI Development Group is offering you a product that will make your life much easier, as well as providing increased protection for your information to the highest possible extent. Our product is the newest and most powerful software for hiding information that is based on using steganography, which makes the information absolutely invisible to other users. ...
 
10.  Xiao steganography - Security/Encryption Tools
... steganography is the art of covered or hidden writing. The purpose of steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. ...
 

Steganography Algorithms

From Short Description
1.  Xiao - Utilities/Security & Encryption
... Xiao steganography, can attach any file into a bitmap image, and protect it using 4 distint algorithms ...
 
2.  SMEDRIX - Mobile/Health & Medical
... SMEDRIX 2.5 algorithms for the health care provider in prehospital emergencies. Resuscitation Guidelines & Emergency Care algorithms reliable, easily at hand, on the go! CONTENTS: algorithms * Situation overview and Primary Survey * Dyspnea adults * Dyspnea child * Allergic reaction * Cardiac arrest adult * Cardiac arrest child * Acute chest pain (including left and right heart failure) * Cardiac arrhythmias * Hypertensive emergency * Hemorrhagic shock * Impaired ...
 
3.  MLProject - Utilities/Other Utilities
... MLP is a library containing a framework for the development of Machine Learning algorithms as well as a set of standard ML algorithms ready to be used. It is similar in the spirit to the weka project, but it is written in C++. ...
 
4.  PSM Encryptor - Utilities/Security & Encryption
... PSM Encryptor is a cryptography and steganography tool. PSM Encryptor will encrypt any group of files (including whole directory structures) but will also disguise the resulting encrypted archive as a working sound or image file. Unlike competitors who just wrap a model around encrypted files, PSM Encryptor weaves the sound or image models into the encrypted files, creating secure documents. Any file type can be turned into a key and optimised keys can also be generated. In addition, PSM ...
 
5.  SteganPEG - Security/Misc
... SteganPEG is an application of steganography to JPEG images. The software can hide your personal, private, or sensitive files in any JPEG image without changing its quality and size considerably. The main reason for choosing the JPEG image format is that it is a compressed image format, that is very popular all over the world today. The images created in this format take very less space, less time to load via internet, and so this format is widely used. It is also the preferred format to save ...
 




6.  HsCipherSDK Encryption Library - Programming/Components & Libraries
... HsCipherSDK is an Encryption Library providing an API to a suite of symmetric key cryptographic algorithms and one way hash digital signature algorithms. The library includes the following block and stream cipher modules:* AES (Advanced Encryption Standard) - FIPS 197* DES and Triple DES (Data Encryption Standard) - FIPS-46-1, FIPS-46-3* ARC4 (Alleged RC4) CAST-128 (a.k.a CAST5) - RFC 2144 * Blowfish algorithm * Twofish algorithm* MD5 message digest algorithm - RFC 1321* SHA-1 (Secure Hash ...
 
7.  MyDataSafe - Security/Password Managers & Generators
... MyDataSafe are using steganography and cryptography to securely store your data.Use MyDataSafe to store any kind of data like in a safe. Do only decrypt your passwords, pin numbers or files for short time, to edit or transfer them to other applications.MyDataSafe kept your data safe and helps you to transfer them to Login-Forms or any Application YOU want. MyDataSafe your tool to read and write security data to local drives or public Servers. ...
 
8.  Picssage - Utilities/Security & Encryption
... Picssage combines two security methods: Cryptography and steganography. Picssage lets you encrypt your messages and hide them inside pictures. ...
 
9.  NoZip - Utilities/Compression tools
... NoZip is a cross-platform file joiner and splitter with steganography capabilities. Generates from multiple files a single file called List Of Files (LOF). Each generated LOF file has an associated index file called LOFi. The LOFi file is needed in order to split the LOF file and extract the initial files. A LOFx contains a LOF and a LOFi into a single file. NoZip can be used also as generic file splitter. ...
 
10.  EasyMemo Data/Password Manager - Utilities/Security & Encryption
... Easy Memo are using steganography and cryptography as data hiding techniques.<p>Use EasyMemo to organize and securely store files, passwords, pin numbers, usernames, email adreses, web adresses, textstrings and other sensitive information by categories in multi encrypted files (.jrm,.bmp.png). Now you can have a single file or organice your datas in many files. <p>Features---------use a single password that you choose to encrypt all the datas you use.-the encryption is done by strong multi ...
 

Steganography Algorithms

From Long Description
1.  Image steganography - Security/Encryption Tools
... Image steganography is a simple and handy software specially created in order to allow the user to hide a secret message or information within an image and allow for later recovery.Image steganography was designed using the Java programming language and can run on multiple operating systems. ...
 
2.  Outguess Rebirth steganography - Security/Encryption Tools
... Outguess-Rebirth is a portable steganography tool for Windows, allows a user to embed hidden data inside a image JPEG. Outguess-Rebirth is 100% free and suitable for highly sensitive data covert transmission. Before hiding data everything is securely encrypted with AES, scrambled, whitened and encoded. Outguess-Rebirth use the Outguess steganography engine, this reduces the chances of anything hidden being detected by specialists tools or forensic expert. The software interface is very ...
 
3.  SilentEye for Linux - Security/Encryption Tools
... SilentEye is a cross-platform application design for an easy use of steganography, in this case hiding messages into pictures or sounds. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process by using a plug-ins system. Two main plug-ins family exists: Format Plug-in : Image format plug-ins: BMP and JPEG plug-in provided, which allow you to save encoded images into .bmp and .jpg files Audio format plug-ins: WAVE plug-in provided for ...
 
4.  ByteShelter I - Security/Encryption Tools
... steganography tool that lets you hide confidential data in Outlook e-mail messages and .doc files ...
 
5.  Unbreakable Encryption Software - Security/Misc
... New encryption software package featuring a completely uncrackable encryption scheme. This tool is designed for the requirements of the undercover agents working in foreign countries, but may be extended to be used by journalists, lawyers, doctors, military personal etc. This is a data security software based on unbreakable encryption including steganographic software. The software hides any text file in a bmp picture file, protect it by password and encrypted by strong encryption algorithm. The ...
 
6.  Aloaha Crypt Disk - Security/Encryption Tools
... Features- Creates a virtual encrypted disk within a file and mounts it as a real disk- Encryption is automatic, real-time (on-the-fly) and transparent- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted- Provides plausible deniability, in case an adversary forces you to reveal the smart card PIN- Hidden volume (steganography) with second smart card- Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Requirements- ...
 
7.  Libmhash - Utilities/Mac Utilities
... Libmhash is a library that provides a uniform interface to several hash algorithms. It supports the basics for message authentication by following rfc2104 (HMAC). It also includes some key generation algorithms which are based on hash algorithms. ...
 
8.  MOEA Framework - Utilities/Mac Utilities
... The MOEA Framework is an open source Java library for developing and experimenting with multiobjective evolutionary algorithms (MOEAs) and other general-purpose optimization algorithms and metaheuristics. A number of algorithms are provided out-of-the-box, including NSGA-II, Iµ-MOEA, GDE3 and MOEA/D. In addition, the MOEA Framework provides the tools necessary to rapidly design, develop, execute and statistically test optimization algorithms. <br>Fast, reliable implementations of many ...
 
9.  Evolutionary Computing IDE - Utilities/Mac Utilities
... An IDE written in Java used to develop, visualize, test and benchmark evolutionary algorithms. The IDE is fully modular, allowing new algorithms to be added as plugins. It can be used to develop other algorithms as well. ...
 
10.  steghide - Utilities/Mac Utilities
... Steghide is a steganography program that is able to hide data in various kindsof image- and audio-files. The color- respectivly sample-frequencies are notchanged thus making the embedding resistant against first-order statisticaltests. ...
 

Steganography Algorithms

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2015 ShareMe Last Update: Sunday, May 27, 2018 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.