numbersprotocol / pyc2paLinks
Python implementation of C2PA: Coalition for Content Provenance and Authenticity.
☆39Updated 3 years ago
Alternatives and similar repositories for pyc2pa
Users that are interested in pyc2pa are comparing it to the libraries listed below
Sorting:
- Command line tool for displaying and adding C2PA manifests☆126Updated last year
- Repository for the public drafts of the C2PA Specifications☆39Updated 3 years ago
- The public specifications for the C2PA☆166Updated 3 weeks ago
- building the next-gen watermark with deep learning.☆185Updated 4 years ago
- Zoom Cryptography Whitepaper☆551Updated 7 months ago
- Robust video watermarking with non-differentiable adversaries.☆312Updated 4 years ago
- A comparison of ffmpeg, Shotdetect and PySceneDetect for shot transition detection☆125Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆135Updated 3 years ago
- A simple client library for cryptographic timestamping service implementing the protocol from RFC3161. Based on python-rfc3161 with some …☆43Updated 2 years ago
- Extraction of watermark embedded with E_BLIND method on multiple digital works.☆13Updated 9 years ago
- a Private Publish Subscribe System☆52Updated last year
- Agenda/Minutes of Anti-Fraud Community Group meetings.☆20Updated 2 months ago
- pyu2f is a python based U2F host library for Linux, Windows, and MacOS. It provides functionality for interacting with a U2F device over …☆84Updated 11 months ago
- Extension to the RTCIceTransport interface defined in WebRTC 1.0☆11Updated 11 months ago
- Merkle-tree in Python☆76Updated 3 months ago
- Noise Protocol Framework - Python 3 implementation☆216Updated 2 years ago
- Encrypted Media Extensions☆192Updated last week
- TLS implementation in pure python, focused on interoperability testing☆264Updated 2 months ago
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆50Updated 5 years ago
- Synthesize photos from PhotoDNA using machine learning 🌱☆149Updated 4 months ago
- Invisible Hyperlinks in Physical Photographs☆815Updated 2 years ago
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Updated 5 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆109Updated 4 years ago
- A system for securely splitting secrets with Shamir's Secret Sharing Scheme☆515Updated 3 years ago
- ☆43Updated 4 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 5 years ago
- SteganoGAN is a tool for creating steganographic images using adversarial training.☆369Updated 2 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- ☆109Updated 2 years ago
- A simple, secure, private webcam for a Raspberry Pi☆71Updated 3 years ago