numbersprotocol / pyc2pa
Python implementation of C2PA: Coalition for Content Provenance and Authenticity.
☆36Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for pyc2pa
- Command line tool for displaying and adding C2PA manifests☆114Updated this week
- The public specifications for the C2PA☆99Updated last month
- Blind video watermarking with great invisibility and robustness.☆74Updated 2 years ago
- ☆39Updated 3 years ago
- Oblivious pseudorandom function over an elliptic curve☆20Updated last year
- A python library that implements a number of Privacy Enhancing Technolgies☆134Updated 2 years ago
- building the next-gen watermark with deep learning.☆182Updated 3 years ago
- INACTIVE - A C library implementing a basic version of the Prio system for private aggregation. https://crypto.stanford.edu/prio/☆79Updated 4 years ago
- Merkle-tree in Python☆71Updated this week
- A raw implementation of Interoperable Private Attribution☆42Updated this week
- A bilinear pairing library for petlib☆35Updated last year
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆49Updated 3 years ago
- The Intel(R) Enhanced Privacy ID Software Development Kit☆30Updated last year
- OPAQUE protocol, a secure asymmetric password authenticated key exchange (aPAKE) that supports mutual authentication in a client-server s…☆74Updated 3 years ago
- The anonymous credentials zoo☆16Updated 3 years ago
- Experimental implementation of KEMTLS in Rustls☆27Updated last year
- Rust source code for the FrodoPIR Private Information Retrieval scheme.☆60Updated 10 months ago
- VDAF specification☆20Updated this week
- A comparison of ffmpeg, Shotdetect and PySceneDetect for shot transition detection☆119Updated 6 years ago
- ☆44Updated 4 months ago
- A collection of algorithms that can do join between two parties while preserving the privacy of keys on which the join happens☆203Updated last month
- Agenda/Minutes of Anti-Fraud Community Group meetings.☆17Updated 3 weeks ago
- This is an implementation of embedding and extracting a digital watermark in a PDF document. The code uses an LDPC code, a Hadamard code,…☆14Updated 7 years ago
- Exploration of NIST post-quantum signatures on-ramp candidates☆23Updated 2 weeks ago
- pure-python implementation of the SPAKE2 Password-Authenticated Key Exchange algorithm☆78Updated last month
- A secure clock-synchronization protocol for when rough is enough.☆136Updated last month
- nGraph-HE: Deep learning with Homomorphic Encryption (HE) through Intel nGraph☆221Updated last year
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Updated 4 years ago
- Cloud native Secure Multiparty Computation Stack☆78Updated last week
- NuCypher fully homomorphic encryption (NuFHE) library implemented in Python☆446Updated 2 years ago