srajat / Visual-Cryptography-Using-K-N-Secret-SharingLinks
An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆16Updated 2 years ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆23Updated 4 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Updated 6 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆124Updated 4 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆45Updated 7 years ago
- hiding an image or text within another image☆36Updated 7 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆42Updated 5 years ago
- ☆55Updated 5 years ago
- Pytorch Implementation of the paper: Multi-Image Steganography Using Deep Neural Networks by Abhishek et. al.☆38Updated 4 years ago
- Image & video steganography in Matlab☆44Updated 12 years ago
- This repository contains the code for encrypting an image using various techniques and PRNGs.☆27Updated 4 years ago
- Global NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"☆53Updated 7 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Updated 8 years ago
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆65Updated 7 years ago
- Image Encryption and Decryption using AES and Visual Cryptography.☆17Updated 3 years ago
- Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps☆42Updated 7 years ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- python program to hide texts inside a video using LSB transformation☆38Updated 5 years ago
- A general approach for using deep neural network for digital watermarking☆15Updated 5 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
- A python program to implement different watermarking algorithms, like dwt, dct, dft,svd and dwt-svd☆49Updated 7 years ago
- Improved way of securing data using combined Steganography and Cryptographic techniques☆16Updated 2 years ago
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆130Updated 7 years ago
- A digital image watermarking algorithm based on combining two transforms; DWT and DCT.☆89Updated 7 years ago
- Steganography: Hiding an image inside another☆360Updated last year
- Implementation of Hidding Images in Plain Sight: Deep Steganography in Pytorch☆36Updated 7 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Updated 6 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Updated 7 years ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆61Updated 5 years ago