srajat / Visual-Cryptography-Using-K-N-Secret-Sharing
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 7 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆21Updated 4 years ago
- Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13Updated 5 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆45Updated 7 years ago
- edu-yinzhaoxia / An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-LabelingThis code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Updated 4 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆120Updated 3 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆14Updated last year
- ☆53Updated last year
- An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN☆17Updated 4 years ago
- Image Encryption using RSA Algorithm in Python☆29Updated 4 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆22Updated 5 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆24Updated 4 years ago
- Minor Project, create a image encryption program using Dna encoding and chaos map☆18Updated 7 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 4 years ago
- Image & video steganography in Matlab☆44Updated 12 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-Pixel-Prediction-and-Bit-plane-CompressionThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆15Updated 4 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 4 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆11Updated 5 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 6 years ago
- hiding an image or text within another image☆35Updated 6 years ago
- Chaos-based image encryption for RGB images using combination of Henon map and Arnold cat map as the chaotic maps.☆13Updated 3 years ago
- Homomorphic Encryption in Python☆20Updated 7 years ago
- This is an image encryption project using AES in Python 2.7.15☆12Updated 4 years ago
- Visual Cryptography is a category of secret sharing where a secret image is divided into n images called as shares. Each share is a rando…☆5Updated 8 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆39Updated 7 months ago
- ☆51Updated 4 years ago
- Classifies a given aadhaar image to real or fake by doing two levels of analysis.☆14Updated 4 years ago
- Image encryption using combination RNA and DNA☆12Updated 5 years ago
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆13Updated 4 years ago
- This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes r…☆14Updated 4 years ago
- This project uses a semi-blind watermarking approach to prove ownership of the image.☆11Updated 4 years ago