An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Jul 2, 2017Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13May 22, 2019Updated 6 years ago
- QR code visual cryptography pipeline☆13Jul 7, 2020Updated 5 years ago
- Split one image into two encrypted images through Visual cryptography where the original image is viewed by overlaying the two encrypted …☆55Dec 27, 2014Updated 11 years ago
- This project is done as part of the course "Image Processing". In this project we implemented an Image Compression and Encryption algorit…☆18Jan 15, 2019Updated 7 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Jan 25, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 5 years ago
- An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding.☆51Oct 13, 2023Updated 2 years ago
- Estimate maximum Lyapunov exponent for short time series using Rosenstein, et al. method☆11Jul 26, 2015Updated 10 years ago
- PRA-TPE: Perfectly recoverable approximate thumbnail-preserving image encryption☆11Mar 24, 2022Updated 4 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆17Oct 3, 2023Updated 2 years ago
- 应用在光学4f系统中的压缩感知算法。光学系统用于图像的传输通信,压缩感知算法在其中做图像加密。☆12Aug 17, 2019Updated 6 years ago
- Image Encryption Algorithm implementation using AES and Visual Cryptography☆12Aug 20, 2020Updated 5 years ago
- Image & video steganography in Matlab☆44May 3, 2013Updated 13 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- Format preserving string substitution encryption☆29Feb 25, 2025Updated last year
- This project uses a semi-blind watermarking approach to prove ownership of the image.☆11Apr 28, 2021Updated 5 years ago
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- 东南大学网络空间安全学院-信息隐藏与数字水印课程实验☆19Dec 1, 2020Updated 5 years ago
- Cryptanalysis of an image scrambling encryption algorithm (ISEA).☆10Sep 19, 2017Updated 8 years ago
- Java资源大全中文版,包括开发库、开发工具、网站、博客、微信、微博等,由伯乐在线持续更新。☆14Apr 25, 2017Updated 9 years ago
- Computer vision and IOT based project for Underwater Garbage Detection and collection☆11Aug 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Watermark for Image Generators☆20Aug 10, 2023Updated 2 years ago
- 与图像加密有关的一些代码☆26Jul 16, 2021Updated 4 years ago
- ☆31Mar 11, 2021Updated 5 years ago
- Source code for 'Dynamical Systems with Applications using MATLAB®, 2ed' by Stephen Lynch http://www.springer.com/book/9783319068190☆34Sep 23, 2020Updated 5 years ago
- WOUAF: Weight Modulation for User Attribution and Fingerprinting in Text-to-Image Diffusion Models (CVPR 2024)☆26Jun 14, 2024Updated last year
- Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks☆25Oct 1, 2021Updated 4 years ago
- breast cancer detection using cnn (DL) & apply model at web app☆10Oct 3, 2021Updated 4 years ago
- image Encryption☆12Apr 25, 2017Updated 9 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆27Oct 9, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Mirror Diffusion Models, NeurIPS 2023☆33Dec 1, 2023Updated 2 years ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆12Jul 3, 2019Updated 6 years ago
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Project for Information assurance and security☆11Dec 7, 2020Updated 5 years ago
- NotesTeX (or its nickname NoTeX) is a simple LaTeX notes taking package for students.☆28Jan 4, 2024Updated 2 years ago
- Breast Cancer Detection App Using Machine Learning XGBoost Classifier☆15Aug 3, 2021Updated 4 years ago
- Image Codec using Private-key cryptography☆13Oct 3, 2023Updated 2 years ago