An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs only K of these shares to generate the original image.
☆33Jul 2, 2017Updated 8 years ago
Alternatives and similar repositories for Visual-Cryptography-Using-K-N-Secret-Sharing
Users that are interested in Visual-Cryptography-Using-K-N-Secret-Sharing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 16, 2017Updated 8 years ago
- Computer vision and IOT based project for Underwater Garbage Detection and collection☆11Aug 23, 2020Updated 5 years ago
- eragavi / Soil-Analysis-and-fertilizer-prediction-model-for-farmers-using-machine-learning-approach-The mobile application predicts the suitable fertilizer for the soil using Naive Bayes Classifier based on the history data sets. The his…☆13Jan 16, 2018Updated 8 years ago
- breast cancer detection using cnn (DL) & apply model at web app☆10Oct 3, 2021Updated 4 years ago
- A python model to detect and segment coughs, forked from coughvid's repo☆15Oct 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆10Jun 17, 2017Updated 8 years ago
- A Simple Flask Application to convert Handwritten Kannada characters into printed text☆15May 1, 2023Updated 2 years ago
- Project for Information assurance and security☆11Dec 7, 2020Updated 5 years ago
- Hardware layout of the Nitrokey FIDO2☆15Jun 25, 2020Updated 5 years ago
- Breast Cancer Detection App Using Machine Learning XGBoost Classifier☆15Aug 3, 2021Updated 4 years ago
- An innovative automation in placement prediction system using Machine Learning Algorithms.☆14Jun 24, 2018Updated 7 years ago
- Repository for PyImageSearch Projects: https://www.pyimagesearch.com/☆18Oct 17, 2019Updated 6 years ago
- Implementing a highly secure video steganography algorithm using Hamming code (7, 4)☆17May 25, 2020Updated 5 years ago
- Arduino programs written in Python using Pyfirmata☆16Nov 21, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An Android App for visually challenged people. The app guides people to walk with voice feedback or vibration feedback.☆14Oct 11, 2019Updated 6 years ago
- Android App for Visually Impaired people to see through their smartphones.☆15Apr 15, 2020Updated 5 years ago
- A single-screen, local competitive platformer. #LOWREZJAM 2016☆14Jan 12, 2019Updated 7 years ago
- julia <3 clojure + macroexpansion☆11May 2, 2016Updated 9 years ago
- A made in python, un-hack-able security camera which is impossible to fool .☆19Oct 18, 2019Updated 6 years ago
- ☆11Aug 10, 2022Updated 3 years ago
- iW-Net: an automatic and minimalistic interactive lung nodule segmentation deep network. By Guilherme Aresta, Colin Jacobs, Teresa Araújo…☆18Dec 3, 2018Updated 7 years ago
- A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms…☆22Sep 1, 2024Updated last year
- Image Encryption using DES, AES & RSA Algorithm☆27Feb 24, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Implemented Artificial Bee Colony Algorithm coupled with fuzzy C means Algorithm using OpenCV and Python. • Combined watershed algorit…☆16Feb 25, 2019Updated 7 years ago
- ☆17Mar 20, 2017Updated 9 years ago
- ☆22Nov 3, 2021Updated 4 years ago
- Solver for 1D nonlinear partial differential equations in Julia based on the collocation method of Skeel and Berzins and providing an API…☆15Aug 5, 2024Updated last year
- ☆17Jun 16, 2021Updated 4 years ago
- Smart traffic junction : Traffic density estimation at junction or intersection using CCTV☆24Sep 28, 2020Updated 5 years ago
- Libre Spatial Information Viewer☆16Dec 31, 2015Updated 10 years ago
- a parser for the .map file included in the aimware leak☆16Feb 19, 2023Updated 3 years ago
- Moebius is a cross-chain oracle that bridges on-chain Ethereum data to Solana.☆10Nov 12, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 9 years ago
- Groundstate Reconstructive Energies using Neural Autoregressive Distribution Estimators (GreNADE)☆10Apr 1, 2022Updated 4 years ago
- ☆12May 20, 2016Updated 9 years ago
- Lightweight 3D physics in golang☆11Dec 29, 2017Updated 8 years ago
- Parking space counter created using OpenCV☆25Apr 23, 2022Updated 3 years ago
- toy project to learn about the memory usage of different workloads with different allocators☆10Mar 30, 2023Updated 3 years ago
- The Wildlife Tracker Project is an Object Tracker customized for tracking Wildlife in India. This project is part of a collaborative effo…☆33Apr 13, 2023Updated 3 years ago