• underisk@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      2 years ago

      I’ve definitely seen image steganography techniques that survive lossy compression.