MrDongdongLin / Cryptanalysis_ISEALinks
Cryptanalysis of an image scrambling encryption algorithm (ISEA).
☆10Updated 8 years ago
Alternatives and similar repositories for Cryptanalysis_ISEA
Users that are interested in Cryptanalysis_ISEA are comparing it to the libraries listed below
Sorting:
- image Encryption☆12Updated 8 years ago
- ☆23Updated 9 years ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆12Updated 6 years ago
- Image Encryption and Decryption using Neural Networks☆15Updated 5 years ago
- This project is done as part of the course "Image Processing". In this project we implemented an Image Compression and Encryption algorit…☆17Updated 6 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆27Updated 4 years ago
- ☆27Updated 6 years ago
- image encryption using Chaotic sequence and LFSR method☆12Updated 7 years ago
- This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. First…☆16Updated 3 years ago
- edu-yinzhaoxia / An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-LabelingThis code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Updated 4 years ago
- This code runs the experiments for 2D Compressed Sensing based Encryption-Then-Compression (2DCS-ETC) scheme.☆13Updated 5 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Updated 6 years ago
- Robust Encryption of Quantum Medical Images☆11Updated 6 years ago
- a residual network for image steganalysis☆18Updated 7 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 6 years ago
- Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks☆26Updated 3 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Updated 5 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Updated 6 years ago
- This is a simple image encryption algorithm based on DMA (Diffused Mandelbrot set + Arnold map) system.☆11Updated 5 years ago
- JEI 2017: Cross-utilizing hyperchaotic and DNA sequences for image encryption☆17Updated 8 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆90Updated 6 years ago
- Code from my research papers☆12Updated 3 years ago
- Universal Adversarial Networks☆33Updated 7 years ago
- Tensorflow implementation of "Deep Learning Hierarchical Representation for Image Steganalysis"☆26Updated 7 years ago
- Steganalysis based deep learning☆58Updated 5 years ago
- ☆17Updated 8 years ago
- An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding.☆46Updated last year
- Watermarking Deep Neural Networks (USENIX 2018)☆99Updated 5 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 4 years ago
- A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT-SVD Technique☆27Updated 8 years ago