Shree987 / Visual-CryptographyLinks
Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)
☆22Updated 4 years ago
Alternatives and similar repositories for Visual-Cryptography
Users that are interested in Visual-Cryptography are comparing it to the libraries listed below
Sorting:
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- ☆52Updated 2 years ago
- The purpose of this project is to take handwritten digits as input, process the digits, train the neural network algorithm with the proce…☆35Updated 6 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆26Updated 4 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆38Updated 2 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆98Updated last year
- Graphical Password Authentication System. This is used to increase the protection/security of a website. Our system is divided into furth…☆21Updated 3 years ago
- Image Encryption Algorithm implementation using AES and Visual Cryptography☆11Updated 5 years ago
- This Project is a Final Year Project on Detection of Phishing Website Using Machine Learning, Copyright (c) 2021 Goodness Adediran All r…☆72Updated 4 months ago
- Increase of Security through Combination of Neural Network and Cryptography.☆12Updated 2 years ago
- Final Year Project☆97Updated 2 years ago
- ☆28Updated 6 years ago
- Refocus an image just by clicking on it with no additional data☆139Updated 2 years ago
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Updated 8 years ago
- Phishers use the websites which are visually similar to those real websites. So, we developed this website so that user can know whether …☆23Updated last year
- Final Year Steganography Project with Code and Project report☆50Updated 3 years ago
- image encryption using Chaotic sequence and LFSR method☆12Updated 7 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆27Updated 4 years ago
- A python tool to detect if a person is wearing a mask or not in real-time using deep learning techniques. It works with images, videos, a…☆62Updated last year
- Malware-Detection-System-Using-Deep-Learning-Project. Project Includes PPT. Code, Explanation Video and Documents☆68Updated 3 years ago
- A secure platform for storing of files using Hybrid Cryptography☆51Updated 3 years ago
- ☆326Updated 4 years ago
- Flask web app for recommending music based on your facial expressions using FER 2013 dataset and Spotify api☆93Updated 2 years ago
- Image Encryption and Decryption using Neural Networks☆15Updated 5 years ago
- An End to End Real Time Face Identification and attendance system using CNN☆117Updated 3 years ago
- Python Script that allows user to encrypt or decrypt images and save it.☆35Updated 2 years ago
- Phishers use the websites which are visually and semantically similar to those real websites. So, we develop this website to come to know…☆195Updated last year
- Improved way of securing data using combined Steganography and Cryptographic techniques☆16Updated 2 years ago
- Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks☆26Updated 3 years ago
- Web app to automatically generate subjective or an objective test and evaluate user responses without any human intervention in an effici…☆116Updated last year