srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆22Updated 4 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆121Updated 3 years ago
- Image & video steganography in Matlab☆44Updated 12 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆15Updated last year
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆26Updated 4 years ago
- ☆53Updated 4 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆38Updated 2 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 6 years ago
- ☆51Updated last year
- A secure platform for storing of files using Hybrid Cryptography☆50Updated 3 years ago
- Homomorphic Encryption in Python☆20Updated 7 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Updated 5 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
- Classifies a given aadhaar image to real or fake by doing two levels of analysis.☆14Updated 4 years ago
- Android App for Visually Impaired people to see through their smartphones.☆13Updated 5 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆27Updated 6 years ago
- In this system we can fill attendance by face recognition☆281Updated last year
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆16Updated 5 years ago
- Implementation of image cryptography using Rubik's Cube Principle https://www.hindawi.com/journals/jece/2012/173931/☆32Updated last year
- Fake news detection using Naïve Bayes in Python along with confusion matrix calculated using sklearn.☆10Updated 3 years ago
- Indian Number Plate Recognition System built using OpenCV☆89Updated 4 years ago
- Driver Drowsiness Detector detects if a driver or a person is drowsy or not, using their eye movements.☆171Updated last year
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆16Updated 8 years ago
- Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud☆54Updated 4 years ago
- Face Recognition Attendance System with Python 3.6 and OpenCV 3.4☆109Updated 5 years ago
- Final Year Project☆95Updated 2 years ago
- This is my B.Tech Final Year project. The aim of this project is to reduce the number of input devices to one which is the webcam.☆21Updated 4 years ago
- ☆70Updated 4 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆46Updated 7 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 5 years ago