srajat / Visual-Cryptography-Using-K-N-Secret-Sharing
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆31Updated 7 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing:
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆42Updated 6 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆120Updated 3 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆11Updated 5 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆28Updated 4 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆22Updated 5 years ago
- Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13Updated 5 years ago
- Hiding Text and Image inside an Image☆17Updated 4 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 6 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆20Updated 3 years ago
- edu-yinzhaoxia / An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-LabelingThis code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆17Updated 4 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 4 years ago
- Image & video steganography in Matlab☆44Updated 11 years ago
- ☆52Updated last year
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆101Updated 11 months ago
- Image encryption using combination RNA and DNA☆11Updated 5 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆24Updated 3 years ago
- ☆51Updated 4 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆11Updated 4 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆21Updated 7 years ago
- Image Encryption using DES, AES & RSA Algorithm☆26Updated 6 years ago
- Visual Cryptography is a category of secret sharing where a secret image is divided into n images called as shares. Each share is a rando…☆5Updated 7 years ago
- Ever sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using i…☆50Updated 4 years ago
- image Encryption☆11Updated 7 years ago
- This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes r…☆13Updated 4 years ago
- Chaos-based image encryption for RGB images using combination of Henon map and Arnold cat map as the chaotic maps.☆13Updated 3 years ago
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆45Updated 7 years ago
- Classifies a given aadhaar image to real or fake by doing two levels of analysis.☆14Updated 4 years ago
- jamiechoi1995 / Blind-image-watermarking-technique-based-on-differential-embedding-in-DWT-and-DCT-domainsunofficial implementation☆9Updated 5 years ago
- ☆22Updated 3 years ago