nishnash54 / TwoStepEncryptionLinks
Applying Steganography followed by Visual Cryptography Encode and Decode data
☆15Updated last year
Alternatives and similar repositories for TwoStepEncryption
Users that are interested in TwoStepEncryption are comparing it to the libraries listed below
Sorting:
- QR code visual cryptography pipeline☆15Updated 4 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆16Updated last year
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆16Updated 5 years ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆14Updated 5 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆86Updated last year
- A distortion limiting approach to Syndrome-Trellis Coding.☆17Updated 2 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 5 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆11Updated 8 years ago
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆13Updated 5 years ago
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Updated 7 years ago
- ☆51Updated 4 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- ☆11Updated 5 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆9Updated 4 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Updated 5 years ago
- Text steganography based on Markov chains☆33Updated 11 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography"☆9Updated 7 years ago
- Steganography applied to conceal small files inside a PNG image.☆18Updated 7 years ago
- Encrypt and decrypt text and files with AES and RSA encryption and image steganography.☆16Updated last year
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Updated 3 years ago
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆35Updated 7 years ago
- An implementation of S-UNIWARD steganography in python☆22Updated 4 years ago
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆29Updated 9 months ago
- A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms…☆15Updated 9 months ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆39Updated 8 months ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆22Updated 4 years ago
- Deep Steganalysis training script☆10Updated last month
- ☆12Updated 8 years ago