nyLiao / Visual-Crypto-QRLinks
QR code visual cryptography pipeline
☆14Updated 5 years ago
Alternatives and similar repositories for Visual-Crypto-QR
Users that are interested in Visual-Crypto-QR are comparing it to the libraries listed below
Sorting:
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆17Updated 2 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆18Updated 2 years ago
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆12Updated 6 years ago
- Image Encryption/Decryption using Rubik's Cube Principle and AES☆10Updated 4 years ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆102Updated 2 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆17Updated 2 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Hide Your secret video inside another video☆73Updated 10 months ago
- python program to hide texts inside a video using LSB transformation☆38Updated 5 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆24Updated 4 years ago
- ☆57Updated 5 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- A simple script designed to run and use i2p and i2pd on tails os along with the tor network!☆19Updated 8 months ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Updated last year
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
- Using CNN's to detect doctored images☆73Updated 7 years ago
- Graphical Password Authentication System. This is used to increase the protection/security of a website. Our system is divided into furth…☆23Updated 4 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆61Updated 5 years ago
- 🔒 World's most secure P2P messenger. End-to-end encrypted, zero-server architecture, quantum-resistant roadmap. WebRTC direct connection…☆24Updated last month
- Image Forgery Detection using Deep learning Graduation project☆95Updated last year
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Updated 6 years ago
- Towards deepfake detection that actually works☆643Updated 3 years ago
- Hide data in plaintext☆16Updated 6 years ago
- Steganographic implementation in images, audio and text files☆42Updated last year
- DeepFake Detection: Detect the video is fake or not using InceptionResNetV2.☆113Updated 5 years ago
- Classifies a given aadhaar image to real or fake by doing two levels of analysis.☆14Updated 5 years ago
- Texpress is a project setup for using ExpressJS with Typescript. It includes a monorepo architecture and uses turborepo for managing the …☆23Updated 2 years ago
- AES 256 & RSA encrypted video steganography. SRU Hackathon 2022 - Cybersecurity Winners☆26Updated 7 months ago