srajat / Visual-Cryptography-Using-K-N-Secret-Sharing
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆28Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆16Updated 3 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆41Updated 6 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 4 years ago
- ☆52Updated last year
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆116Updated 3 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆23Updated 3 years ago
- ☆22Updated 8 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆14Updated last year
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆13Updated 5 years ago
- Minor Project, create a image encryption program using Dna encoding and chaos map☆18Updated 6 years ago
- Visual Cryptography is a category of secret sharing where a secret image is divided into n images called as shares. Each share is a rando…☆5Updated 7 years ago
- Image Encryption Algorithm implementation using AES and Visual Cryptography☆11Updated 4 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆36Updated last year
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆11Updated 3 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆40Updated 6 years ago
- Chaos-based image encryption for RGB images using combination of Henon map and Arnold cat map as the chaotic maps.☆12Updated 3 years ago
- This project is done as part of the course "Image Processing". In this project we implemented an Image Compression and Encryption algorit…☆15Updated 5 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆16Updated 2 years ago
- Image Encryption using RSA Algorithm in Python☆29Updated 4 years ago
- Single image encryption (and decryption) using logistic map equation and linear feedback shift.☆11Updated 5 years ago
- Image encryption using combination RNA and DNA☆11Updated 5 years ago
- ☆50Updated 4 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆23Updated 4 years ago
- image Encryption☆11Updated 7 years ago
- image encryption using Chaotic sequence and LFSR method☆11Updated 6 years ago
- MATLAB program with GUI to watermark images☆37Updated 6 years ago
- 基于混沌系统和DNA编码运算的图像分块加密算法☆42Updated 6 years ago
- Image & video steganography in Matlab☆42Updated 11 years ago
- Cryptanalysis of an image scrambling encryption algorithm (ISEA).☆9Updated 7 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆21Updated 7 years ago