srajat / Visual-Cryptography-Using-K-N-Secret-Sharing
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆26Updated 7 years ago
Related projects: ⓘ
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆13Updated 3 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆41Updated 6 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆110Updated 3 years ago
- Django web application in Python that enhances data protection through the encryption of uploaded files using AES, Blowfish, and Transpos…☆8Updated 7 years ago
- Image Encryption/Decryption application using Rubik's Cube Algorithm and RSA☆12Updated 4 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆13Updated 11 months ago
- ☆46Updated last year
- ☆37Updated this week
- In this project we implement a DNA-Genetic Encryption Technique (D-GET) in order to make the DNA SEQUENCE more secure and less predictabl…☆10Updated 3 years ago
- Major project - Linux based secure systems manager☆12Updated 5 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆40Updated 4 years ago
- The purpose of this project is to take handwritten digits as input, process the digits, train the neural network algorithm with the proce…☆31Updated 5 years ago
- Implementation of image cryptography using Rubik's Cube Principle https://www.hindawi.com/journals/jece/2012/173931/☆33Updated 8 months ago
- Image & video steganography in Matlab☆41Updated 11 years ago
- Final Year Project☆23Updated 7 years ago
- This is my B.Tech Final Year project. The aim of this project is to reduce the number of input devices to one which is the webcam.☆20Updated 3 years ago
- ☆12Updated 3 years ago
- Android App for Visually Impaired people to see through their smartphones.☆12Updated 4 years ago
- Visual Cryptography is a category of secret sharing where a secret image is divided into n images called as shares. Each share is a rando…☆4Updated 7 years ago
- Image Encryption using RSA Algorithm in Python☆28Updated 4 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆10Updated 4 years ago
- Smart Health Predictor with Data Mining using Php, Mysql. Which can predict the disease based on Input Symptoms and Lab Sample.☆30Updated 3 years ago
- ☆21Updated 8 years ago
- This project is a online project management system for undergraduate and graduate students and their supervisors. It is Django Framework …☆28Updated 3 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆23Updated 3 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆34Updated last year
- Computer Science Bachelor's Final Year Project with all Documents☆39Updated 3 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆26Updated 5 years ago
- a web application for supply chain management for Smart India Hackathon 2019☆8Updated 5 years ago
- It is a basic attendance system based on GUI and marks attendance only if the mask is detected and uses SQLite database. It is under deve…☆17Updated 2 years ago