srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 5 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆24Updated 4 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- Image & video steganography in Matlab☆44Updated 12 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆44Updated 7 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆17Updated 2 years ago
- ☆57Updated 5 years ago
- Secure File Storage in Cloud Computing using Hybrid Cryptography Algorithms. Colossus ensures security of the user’s data stored on cloud…☆37Updated 2 years ago
- A web application to simulate blockchain-based e-voting protocol☆75Updated 2 years ago
- hiding an image or text within another image☆36Updated 7 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 7 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆26Updated 4 years ago
- ☆38Updated 5 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 5 years ago
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Updated 4 years ago
- A secure platform for storing of files using Hybrid Cryptography☆52Updated 3 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17Updated 5 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- Android App for Visually Impaired people to see through their smartphones.☆15Updated 5 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Updated 6 years ago
- ☆50Updated 2 years ago
- Homomorphic Encryption in Python☆20Updated 8 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆54Updated 8 years ago
- Online Flask Web App for Plant Disease Diagnosis from Images☆23Updated 5 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- MATLAB program with GUI to watermark images☆37Updated 7 years ago
- Image forgery detection using convolutional neural networks. Group 10's final project for TU Delft's course CS4180 Deep Learning 2019.☆173Updated 2 years ago
- Image Encryption using RSA Algorithm in Python☆30Updated 5 years ago
- Hybrid n-layer file encryption and decryption algorithm.☆12Updated last year
- A demonstration of asset tracking blockchain, a generic use-case in IoT.☆27Updated 7 years ago