nishnash54 / TwoStepEncryption
Applying Steganography followed by Visual Cryptography Encode and Decode data
☆14Updated last year
Alternatives and similar repositories for TwoStepEncryption
Users that are interested in TwoStepEncryption are comparing it to the libraries listed below
Sorting:
- QR code visual cryptography pipeline☆14Updated 4 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆16Updated last year
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆14Updated 4 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆16Updated 4 years ago
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆13Updated 5 years ago
- Encrypt and decrypt text and files with AES and RSA encryption and image steganography.☆16Updated last year
- A terminal chat app using python that allows user to send and receive secret messages hidden safely inside an image(steganography).☆7Updated 4 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆16Updated 8 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆83Updated last year
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Updated 3 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆17Updated 2 years ago
- Image Steganography Using Python and Tkinter☆29Updated 4 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Updated 5 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆21Updated 4 years ago
- A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms…☆15Updated 8 months ago
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Updated 7 years ago
- Data Hiding in Image☆10Updated 5 years ago
- Implementation of a system capable of encryption and decryption of multimedia data (Text, Images, Videos, Audio etc.) using a hybrid mode…☆21Updated last year
- Android App for Visually Impaired people to see through their smartphones.☆13Updated 5 years ago
- Project for Information assurance and security☆9Updated 4 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆24Updated 4 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 5 years ago
- It's an end-to-end Machine Learning Project. The prediction has been done by using Machine Learning (ML) classification algorithms and it…☆11Updated 2 years ago
- Steganography in Twitter using retweets☆11Updated 2 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆9Updated 4 years ago
- AES 256 & RSA encrypted video steganography. SRU Hackathon 2022 - Cybersecurity Winners☆23Updated last year
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆10Updated 6 years ago
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆13Updated 4 years ago
- ☆51Updated 4 years ago