manishjathan / Image-Encryption-Using-Chaotic-MapLinks
Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.
☆44Updated 7 years ago
Alternatives and similar repositories for Image-Encryption-Using-Chaotic-Map
Users that are interested in Image-Encryption-Using-Chaotic-Map are comparing it to the libraries listed below
Sorting:
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 7 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- Cryptanalysis of an image scrambling encryption algorithm (ISEA).☆10Updated 8 years ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆111Updated last year
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 5 years ago
- image Encryption☆12Updated 8 years ago
- This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. First…☆16Updated 4 years ago
- edu-yinzhaoxia / An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-LabelingThis code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Updated 5 years ago
- This project is done as part of the course "Image Processing". In this project we implemented an Image Compression and Encryption algorit…☆17Updated 7 years ago
- Image encryption using combination RNA and DNA☆12Updated 6 years ago
- Applying Laplace and exponential mechanisms to add random noise to data for differential privacy. Plotting MSE vs. epsilon.☆31Updated last month
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Updated 4 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆27Updated 5 years ago
- 基于混沌系统和DNA编码的彩色数字图像加密、解密、抗噪声性能分析以及抗裁剪性能分析☆132Updated 6 years ago
- Watermarking Deep Neural Networks (USENIX 2018)☆101Updated 5 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆85Updated 2 years ago
- 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆146Updated 2 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Updated 5 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117Updated 2 years ago
- Membership Inference, Attribute Inference and Model Inversion attacks implemented using PyTorch.☆66Updated last year
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆83Updated last year
- Chaos-based image encryption for RGB images using combination of Henon map and Arnold cat map as the chaotic maps.☆12Updated 4 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆49Updated 8 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Updated 5 years ago
- 基于混沌系统和DNA编码运算的图像分块加密算法☆50Updated 7 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 5 years ago
- A repo to download and preprocess the Purchase100 dataset extracted from Kaggle: Acquire Valued Shoppers Challenge☆12Updated 4 years ago
- Python implementation of differential privacy using Laplace mechanism☆11Updated 3 years ago
- Medical data is often highly sensitive in terms of data privacy and security concerns. Federated learning, one type of machine learn- ing…☆24Updated 3 years ago