nishnash54 / TwoStepEncryptionLinks
Applying Steganography followed by Visual Cryptography Encode and Decode data
☆17Updated 2 years ago
Alternatives and similar repositories for TwoStepEncryption
Users that are interested in TwoStepEncryption are comparing it to the libraries listed below
Sorting:
- QR code visual cryptography pipeline☆14Updated 5 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆16Updated 2 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆18Updated 2 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆103Updated 2 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Updated 8 years ago
- Data Hiding in Image☆10Updated 5 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆28Updated 4 years ago
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆12Updated 6 years ago
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Updated 8 years ago
- Image Steganography Using Python and Tkinter☆33Updated 5 years ago
- It's an end-to-end Machine Learning Project. The prediction has been done by using Machine Learning (ML) classification algorithms and it…☆11Updated 3 years ago
- Graphical Password Authentication System. This is used to increase the protection/security of a website. Our system is divided into furth…☆23Updated 4 years ago
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Updated 3 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Updated 6 years ago
- ☆57Updated 5 years ago
- Android App for Visually Impaired people to see through their smartphones.☆15Updated 5 years ago
- A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms…☆18Updated last year
- Implementation of a system capable of encryption and decryption of multimedia data (Text, Images, Videos, Audio etc.) using a hybrid mode…☆21Updated last year
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Updated 6 years ago
- This repo is about Vehicle Price Prediction using machine learning and web app created using flask server andalso deployed on heroku☆11Updated 4 years ago
- ☆17Updated 3 years ago
- It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Pyt…☆186Updated 8 months ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
- Network Intrusion Detection System☆48Updated 2 years ago
- Final Year Project in Computer Vision that detects and reports traffic violations for safety purposes.☆44Updated 3 years ago
- Final Year Project☆101Updated 3 years ago
- Indian paper currency detection using Image Processing☆38Updated 5 years ago