Applying Steganography followed by Visual Cryptography Encode and Decode data
☆17Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for TwoStepEncryption
Users that are interested in TwoStepEncryption are comparing it to the libraries listed below
Sorting:
- QR code visual cryptography pipeline☆14Jul 7, 2020Updated 5 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Jan 25, 2022Updated 4 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 8 years ago
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Jan 13, 2022Updated 4 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆19Mar 7, 2023Updated 2 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆17Jul 25, 2023Updated 2 years ago
- Android App for Visually Impaired people to see through their smartphones.☆15Apr 15, 2020Updated 5 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms…☆22Sep 1, 2024Updated last year
- Hide data in plaintext☆16Mar 25, 2019Updated 6 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆24Mar 23, 2021Updated 4 years ago
- The Wildlife Tracker Project is an Object Tracker customized for tracking Wildlife in India. This project is part of a collaborative effo…☆33Apr 13, 2023Updated 2 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Uses retrained MobileNetV2 classification models to determine whether an Indian currency note is fake or real (based on watermark and flu…☆25Dec 8, 2022Updated 3 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- Invisible Unicode Messages☆26Aug 27, 2015Updated 10 years ago
- Text steganography based on Markov chains☆34Mar 1, 2014Updated 11 years ago
- It's an end-to-end Machine Learning Project. The prediction has been done by using Machine Learning (ML) classification algorithms and it…☆11Nov 26, 2022Updated 3 years ago
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Jul 2, 2017Updated 8 years ago
- simple brain tumor detection using DCNNs☆30Sep 25, 2020Updated 5 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- 🔒 World's most secure P2P messenger. End-to-end encrypted, zero-server architecture, quantum-resistant roadmap. WebRTC direct connection…☆27Jan 7, 2026Updated last month
- Computer vision and IOT based project for Underwater Garbage Detection and collection☆11Aug 23, 2020Updated 5 years ago
- This repository was a submission to Unscript hackthon 2022. Domain of AI/ML and Skin Type Recognition problem statement.☆11Jan 23, 2022Updated 4 years ago
- This project analyzes and predicts housing sale price based on features such as square footage, number of bedrooms, views, locations, etc…☆10Jul 27, 2019Updated 6 years ago
- This project is for the ultimate manner of identifying the License Plate. Combining YOLOv7 object detection, Hough transform alignment, a…☆40Dec 6, 2023Updated 2 years ago
- The deaf-mute community have undeniable communication problems in their daily life. Recent developments in artificial intelligence tear d…☆36Jun 6, 2021Updated 4 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last week
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Peer-to-peer NATS message routing and S3 object sync solution☆18Feb 5, 2026Updated 3 weeks ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- Turning DIY Bitcoin nodes from pets to cattle☆10Dec 1, 2024Updated last year
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- ☆12Jul 24, 2023Updated 2 years ago
- Progressive Bitcoin-Lightning wallet☆10Feb 15, 2026Updated last week