A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"
☆23Sep 6, 2019Updated 6 years ago
Alternatives and similar repositories for Reversible-Data-Hiding-in-Encrypted-Image
Users that are interested in Reversible-Data-Hiding-in-Encrypted-Image are comparing it to the libraries listed below
Sorting:
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- ☆21Oct 19, 2017Updated 8 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Dec 11, 2020Updated 5 years ago
- Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions. This repository contains experimental results f…☆11Apr 21, 2021Updated 4 years ago
- Cryptanalysis of an image scrambling encryption algorithm (ISEA).☆10Sep 19, 2017Updated 8 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- Data for "An Image Encryption Scheme Based on a Hybrid Model of DNA Computing, Chaotic Systems and Hash Functions"☆39Feb 24, 2020Updated 6 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆24Mar 23, 2021Updated 4 years ago
- ☆28Nov 18, 2018Updated 7 years ago
- Implementation of Secure image encryption scheme using double random-phase encoding and compressed sensing☆28May 4, 2023Updated 2 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆26Mar 30, 2021Updated 4 years ago
- Repo for ResNet-50☆29Feb 6, 2020Updated 6 years ago
- MATLAB example of deep learning based human pose estimation.☆28Dec 22, 2025Updated 2 months ago
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Jul 2, 2017Updated 8 years ago
- FHCCS based chaotic image encryption.☆11Oct 7, 2023Updated 2 years ago
- This repository contains the source codes of a novel variant of the Grey Wolf Optimization (GWO) algorithm, named Velocity-Aided Grey Wol…☆12Mar 18, 2022Updated 3 years ago
- ☆11Jul 14, 2018Updated 7 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- Realizing chaos of fractional order chaotic system☆11Mar 3, 2017Updated 9 years ago
- Utility for converting TLE to Keplerian elements and GMAT code☆12Mar 28, 2020Updated 5 years ago
- Double-Niched Evolutionary Algorithm (DNEA) for Multi-Modal Multi-Objective Optimization (PPSN 2018 & CEC 2019)☆10Mar 26, 2021Updated 4 years ago
- Biometric systems have become a major part of research due its application of identification. Code provides a multimodal biometric system…☆11Aug 16, 2016Updated 9 years ago
- A complete pipelined automatic process for skull stripping and tumor segmentation from Brain MRI using Thresholding.☆14Jun 1, 2021Updated 4 years ago
- Affine scale-invariant feature transform implementation in Matlab.☆11Mar 13, 2018Updated 7 years ago
- ☆11Sep 14, 2022Updated 3 years ago
- ☆11Dec 30, 2021Updated 4 years ago
- Convolutional Neural Network-Based Digital Image Watermarking paper implementation☆10Apr 3, 2022Updated 3 years ago
- Image Encryption and Decryption using Neural Networks☆16Oct 14, 2019Updated 6 years ago
- BILSTM, GMDH and Genetic COVID Forecasting Into Desired Steps of Future☆12Nov 23, 2024Updated last year
- KMean Coreset evaluation and computation.☆12Jun 6, 2017Updated 8 years ago
- Matlab utilities functions for generating Pseudo random m-sequences ( PRMS and PRBS)☆10Feb 6, 2020Updated 6 years ago
- This example shows how to build and train a convolutional neural network (CNN) from scratch to perform a classification task with an EEG …☆56Jan 9, 2023Updated 3 years ago
- 过往收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集☆12Mar 28, 2025Updated 11 months ago
- This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes r…☆14Nov 9, 2020Updated 5 years ago
- PSO-SA - a hybrid Particle Swarm Optimization and Simulated Annealing algorithm for automatic AI algorithm selection and tuning (for skle…☆13Aug 30, 2019Updated 6 years ago
- Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing☆11Dec 21, 2018Updated 7 years ago
- Supporting informations and codes for paper https://doi.org/10.1016/j.ijthermalsci.2016.05.015☆15Jun 6, 2025Updated 9 months ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆111Mar 11, 2024Updated last year