• underisk@lemmy.ml
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      9 months ago

      I’ve definitely seen image steganography techniques that survive lossy compression.