srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Image & video steganography in Matlab☆44Updated 12 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆22Updated 4 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
- An innovative automation in placement prediction system using Machine Learning Algorithms.☆14Updated 7 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆16Updated 8 years ago
- ☆53Updated 4 years ago
- The purpose of this project is to take handwritten digits as input, process the digits, train the neural network algorithm with the proce…☆34Updated 6 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Proposed Solution: We propose a smart Wireless Garbage Bin equipped with LoRa RF and IoT technologies to solve this emerging issue in Cit…☆24Updated 7 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆46Updated 7 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- In this system we can fill attendance by face recognition☆284Updated last year
- hiding an image or text within another image☆35Updated 7 years ago
- Android App for Visually Impaired people to see through their smartphones.☆13Updated 5 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆12Updated 4 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆28Updated 4 years ago
- An attendance system based on facial recognition built using OpenCV and Django.☆41Updated 2 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆38Updated 2 years ago
- A secure platform for storing of files using Hybrid Cryptography☆51Updated 3 years ago
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆36Updated 4 years ago
- A facial recognition based attendance system; Summer School 2018☆32Updated 2 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆53Updated 7 years ago
- Uses retrained MobileNetV2 classification models to determine whether an Indian currency note is fake or real (based on watermark and flu…☆24Updated 2 years ago
- Smart Health Predictor with Data Mining using Php, Mysql. Which can predict the disease based on Input Symptoms and Lab Sample.☆32Updated 4 years ago
- Face Recognition Attendance System with Python 3.6 and OpenCV 3.4☆110Updated 5 years ago
- python program to hide texts inside a video using LSB transformation☆37Updated 5 years ago
- Python implementation of simple face recognition based attendance system using face_recognition library.☆14Updated 4 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Updated 3 years ago