srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆38Updated 2 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆40Updated 5 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆46Updated 7 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆22Updated 4 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Image & video steganography in Matlab☆44Updated 12 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- ☆53Updated 4 years ago
- In this project I have made predictions for a wine quality based on several features such as PH level, alcohol content etc. of a wine. Th…☆23Updated 4 years ago
- ☆52Updated 2 years ago
- python program to hide texts inside a video using LSB transformation☆38Updated 5 years ago
- hiding an image or text within another image☆35Updated 7 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆10Updated 4 years ago
- A machine learning program, that detects denial of service attack using machine learning technique.☆26Updated 6 years ago
- Hiding Text and Image inside an Image☆17Updated 4 years ago
- Implemented entropy-based detection using Python to allow POX controller to detect UDP Flood Attack in the simulated networks using Minin…☆22Updated 6 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 6 years ago
- Android App for Visually Impaired people to see through their smartphones.☆13Updated 5 years ago
- An innovative automation in placement prediction system using Machine Learning Algorithms.☆14Updated 7 years ago
- Implementation of image cryptography using Rubik's Cube Principle https://www.hindawi.com/journals/jece/2012/173931/☆32Updated last year
- A secure platform for storing of files using Hybrid Cryptography☆51Updated 3 years ago
- It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Pyt…☆176Updated 5 months ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Updated 3 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Updated 5 years ago
- This is my B.Tech Final Year project. The aim of this project is to reduce the number of input devices to one which is the webcam.☆21Updated 4 years ago
- Network Intrusion Detection System☆47Updated 2 years ago
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆13Updated 4 years ago