srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Image & video steganography in Matlab☆44Updated 12 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆16Updated 2 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆23Updated 4 years ago
- ☆57Updated 5 years ago
- hiding an image or text within another image☆36Updated 7 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆45Updated 7 years ago
- Implementation of image cryptography using Rubik's Cube Principle https://www.hindawi.com/journals/jece/2012/173931/☆32Updated last year
- Image Forgery Detection using Deep learning Graduation project☆94Updated last year
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 7 years ago
- DeepFake Detection: Detect the video is fake or not using InceptionResNetV2.☆112Updated 5 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Image forgery detection using convolutional neural networks. Group 10's final project for TU Delft's course CS4180 Deep Learning 2019.☆172Updated 2 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Updated 6 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Updated 3 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- Homomorphic Encryption in Python☆20Updated 7 years ago
- Privacy mechanisms for decentralized fingerprint-based authentication☆13Updated 5 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆49Updated 8 years ago
- Face Recognition Attendance System with Python 3.6 and OpenCV 3.4☆111Updated 5 years ago
- Android App for Visually Impaired people to see through their smartphones.☆15Updated 5 years ago
- It is based on Image Processing. It has been implemented with "Python3" and "OpenCv3.3.0"☆19Updated 6 years ago
- ☆22Updated 9 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Updated 7 years ago
- Recognizes faces☆110Updated 2 years ago
- Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud☆58Updated 4 years ago
- Classifies a given aadhaar image to real or fake by doing two levels of analysis.☆14Updated 5 years ago
- An innovative automation in placement prediction system using Machine Learning Algorithms.☆15Updated 7 years ago