iamtheky Posted December 13, 2015 Share Posted December 13, 2015 Lets drag this topic into something real-ish, and now-ish, and hell of a lot more fun. What is our ability to participate in embedding data in seemingly innocuous noises? The math here seems unnecessary unless you are trying to slip it by an individual expecting data:https://gist.github.com/windytan/d3bca32a22998dab962ehere is the overview:http://www.windytan.com/2015/10/pea-whistle-steganography.html?m=1&utm_content=buffer3e26f&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer ,-. .--. ________ .-. .-. ,---. ,-. .-. .-. .-. |(| / /\ \ |\ /| |__ __||| | | || .-' | |/ / \ \_/ )/ (_) / /__\ \ |(\ / | )| | | `-' | | `-. | | / __ \ (_) | | | __ | (_)\/ | (_) | | .-. | | .-' | | \ |__| ) ( | | | | |)| | \ / | | | | | |)| | `--. | |) \ | | `-' |_| (_) | |\/| | `-' /( (_)/( __.' |((_)-' /(_| '-' '-' (__) (__) (_) (__) Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now