srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
 An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆45Updated 7 years ago
 - Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆23Updated 4 years ago
 - ☆54Updated 4 years ago
 - Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated 2 years ago
 - This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
 - Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
 - Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 7 years ago
 - Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
 - A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
 - Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆53Updated 7 years ago
 - python program to hide texts inside a video using LSB transformation☆38Updated 5 years ago
 - Homomorphic Encryption in Python☆20Updated 7 years ago
 - Hiding Images within other images using Deep Learning☆208Updated 7 years ago
 - Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Updated 6 years ago
 - Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"☆13Updated 6 years ago
 - Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Updated 4 years ago
 - A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆130Updated 7 years ago
 - ☆52Updated 2 years ago
 - An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
 - SteganoGAN is a tool for creating steganographic images using adversarial training.☆360Updated 2 years ago
 - hiding an image or text within another image☆36Updated 7 years ago
 - A machine learning program, that detects denial of service attack using machine learning technique.☆26Updated 6 years ago
 - A secure platform for storing of files using Hybrid Cryptography☆50Updated 3 years ago
 - Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆37Updated 2 years ago
 - Deep learning based image steganalysis in spatial domain☆11Updated 7 years ago
 - A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆49Updated 7 years ago
 - Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 7 years ago
 - Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
 - 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆145Updated 2 years ago
 - Simple Python Ring-Learning With Errors Key Exchange☆18Updated 8 years ago