Applying Steganography followed by Visual Cryptography Encode and Decode data
☆17Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for TwoStepEncryption
Users that are interested in TwoStepEncryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QR code visual cryptography pipeline☆13Jul 7, 2020Updated 5 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Jan 25, 2022Updated 4 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆26Mar 23, 2021Updated 5 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 9 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Jan 13, 2022Updated 4 years ago
- Hide data in plaintext☆16Mar 25, 2019Updated 7 years ago
- An implementation of S-UNIWARD steganography in python☆23Oct 21, 2020Updated 5 years ago
- ☆17Mar 20, 2017Updated 9 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- The Wildlife Tracker Project is an Object Tracker customized for tracking Wildlife in India. This project is part of a collaborative effo…☆33Apr 13, 2023Updated 3 years ago
- Uses retrained MobileNetV2 classification models to determine whether an Indian currency note is fake or real (based on watermark and flu…☆24Dec 8, 2022Updated 3 years ago
- simple brain tumor detection using DCNNs☆31Sep 25, 2020Updated 5 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆19Mar 7, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Mar 2, 2014Updated 12 years ago
- Invisible Unicode Messages☆26Aug 27, 2015Updated 10 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A real-time human counter that uses HOG and SVM. Developed as project for the Computer Vision course at Sapienza University of Rome (2021…☆12Apr 2, 2022Updated 4 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A toolkit for Visual Cryptography and Random Grid schemes☆94Mar 27, 2025Updated last year
- This is the official implementation of NNSplitter (ICML'23)☆12Jun 11, 2024Updated last year
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆55Jun 1, 2025Updated 10 months ago
- ☆19Sep 26, 2020Updated 5 years ago
- It's an end-to-end Machine Learning Project. The prediction has been done by using Machine Learning (ML) classification algorithms and it…☆12Nov 26, 2022Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- This project leverages YOLO (You Only Look Once) to detect various traffic violations in real-time, aimed at improving road safety and co…☆18Feb 12, 2025Updated last year
- PyTorch Implementation of "Facial Image-to-Video Translation by a Hidden Affine Transformation" in MM'19.☆54Oct 29, 2019Updated 6 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- ☆11Dec 16, 2017Updated 8 years ago
- The deaf-mute community have undeniable communication problems in their daily life. Recent developments in artificial intelligence tear d…☆36Jun 6, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- This repository was a submission to Unscript hackthon 2022. Domain of AI/ML and Skin Type Recognition problem statement.☆12Jan 23, 2022Updated 4 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Car number plate recognition project using Deep Learning frameworks like Yolo, CNN, and CRNN models☆11Dec 8, 2022Updated 3 years ago
- image classification with VGG16+SVM and VGG-16☆11Jul 12, 2019Updated 6 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 4 years ago