• underisk@lemmy.ml
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    9 months ago

    I’ve definitely seen image steganography techniques that survive lossy compression.