Skip to main content

Module domain

Module domain 

Source
Expand description

Domain layer — pure business logic, no I/O.

Sub-modules are bounded contexts. All share the canonical type vocabulary defined in types.

Modules§

adaptive
Adversarial embedding optimisation, camera model profile matching, compression-survivable embedding.
analysis
Capacity estimation and chi-square detectability analysis, plus spectral-domain detectability scoring.
archive
ZIP / TAR / TAR.GZ archive handling.
canary
Canary shard tripwires for distribution compromise detection.
corpus
Corpus steganography: zero-modification cover selection via ANN search.
correction
Reed-Solomon K-of-N erasure coding with HMAC integrity.
crypto
ML-KEM-1024, ML-DSA-87, Argon2id, AES-256-GCM, and secure zeroing.
deadrop
Dead drop mode: platform-aware cover generation for public posting.
deniable
Dual-payload deniable steganography and panic wipe.
distribution
Four distribution patterns: 1:1, 1:N, N:1, N:M.
errors
Domain error types for all bounded contexts.
media
Image (PNG/BMP/JPEG/GIF) and audio (WAV) codec adapters.
opsec
Amnesiac mode, geographic distribution manifests, forensic watermark tripwires.
pdf
PDF first-class bounded context: embed/extract, page-render pipeline, stego techniques.
ports
Port trait definitions for all bounded contexts.
reconstruction
K-of-N shard reassembly with manifest verification.
scrubber
Linguistic stylometric fingerprint scrubbing.
stego
Steganography techniques: LSB image, DCT JPEG, palette, audio, zero-width text.
timelock
Time-lock puzzle payloads using Rivest iterated squaring.
types
Canonical type vocabulary shared across all bounded contexts.