nyLiao / Visual-Crypto-QRLinks
QR code visual cryptography pipeline
☆15Updated 5 years ago
Alternatives and similar repositories for Visual-Crypto-QR
Users that are interested in Visual-Crypto-QR are comparing it to the libraries listed below
Sorting:
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Updated 3 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆93Updated last year
- A distortion limiting approach to Syndrome-Trellis Coding.☆17Updated 2 years ago
- Graphical Password Authentication System. This is used to increase the protection/security of a website. Our system is divided into furth…☆21Updated 3 years ago
- A TelegramBot for true paranoids.☆10Updated 6 months ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- An encryption format offering better security, performance and ease of use than PGP. File a bug if you found anything where we are worse …☆42Updated last year
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- The hottest miniscript signing server☆11Updated last year
- Weapon detection using neural networks in surveillance☆43Updated 2 years ago
- Two-Factor-Authentication (2FA) Android app for the Satochip hardware wallet☆12Updated 2 years ago
- Weapon Detection & Classification through CCTV surveillance using Deep Learning-CNNs.☆107Updated 5 years ago
- Pybot can change the way learners try to learn python programming language in a more interactive way. This chatbot will try to solve or p…☆94Updated 4 years ago
- This repository was a submission to Unscript hackthon 2022. Domain of AI/ML and Skin Type Recognition problem statement.☆11Updated 3 years ago
- ☆53Updated 4 years ago
- 🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks☆341Updated 5 years ago
- Veronica is your virtual assistant who talks and take voice commands and work just like google assistant. She can order food, send mails,…☆10Updated 5 years ago
- Nostr Osint Tool 🔎 𓅦☆26Updated last year
- Python nostr bot framework☆22Updated 2 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
- Classic BWS: Liveness Detection, Deepfake Detection and PhotoVerify Face Match for KYC☆39Updated 2 months ago
- 🏓 Ping and find best relays for you 📡☆12Updated 2 years ago
- python program to hide texts inside a video using LSB transformation☆37Updated 5 years ago
- The Wildlife Tracker Project is an Object Tracker customized for tracking Wildlife in India. This project is part of a collaborative effo…☆33Updated 2 years ago
- Simple Snapchat-like face filters with Python dlib.☆10Updated 4 years ago
- Steganography in Twitter using retweets☆12Updated 3 years ago
- Identify faces from video and images using OpenCV and Deep Learning☆145Updated last year
- Sync long-form Nostr notes to a local folder.☆16Updated 2 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago