srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆120Updated 3 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆22Updated 4 years ago
- Image & video steganography in Matlab☆44Updated 12 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆16Updated 5 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Updated 3 years ago
- A secure platform for storing of files using Hybrid Cryptography☆50Updated 3 years ago
- hiding an image or text within another image☆35Updated 7 years ago
- ☆53Updated 4 years ago
- Android App for Visually Impaired people to see through their smartphones.☆13Updated 5 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆46Updated 7 years ago
- Indian paper currency detection using Image Processing☆37Updated 5 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 6 years ago
- Django web application in Python that enhances data protection through the encryption of uploaded files using AES, Blowfish, and Transpos…☆8Updated 8 years ago
- ☆52Updated last year
- ☆15Updated 4 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆16Updated 8 years ago
- Image Forgery Detection using Deep learning Graduation project☆90Updated last year
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆12Updated 4 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
- Final Year Project in Computer Vision that detects and reports traffic violations for safety purposes.☆41Updated 2 years ago
- Using deep learning model to detect the disease of a plant through the smart phone using camera to scan over leaf and guide them with ins…☆67Updated 4 years ago
- Uses retrained MobileNetV2 classification models to determine whether an Indian currency note is fake or real (based on watermark and flu…☆24Updated 2 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆38Updated 2 years ago
- This was our Final Project for Distributed Computing. In this we had to create a distributed system that will use the Brute Force Algorit…☆12Updated 3 years ago
- This is my B.Tech Final Year project. The aim of this project is to reduce the number of input devices to one which is the webcam.☆21Updated 4 years ago
- Implementation of image cryptography using Rubik's Cube Principle https://www.hindawi.com/journals/jece/2012/173931/☆32Updated last year
- An innovative automation in placement prediction system using Machine Learning Algorithms.☆14Updated 7 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆16Updated 2 years ago
- Proposed Solution: We propose a smart Wireless Garbage Bin equipped with LoRa RF and IoT technologies to solve this emerging issue in Cit…☆24Updated 7 years ago