tafseerahmed / image-Encryption-dna-encodingLinks
Minor Project, create a image encryption program using Dna encoding and chaos map
☆19Updated 7 years ago
Alternatives and similar repositories for image-Encryption-dna-encoding
Users that are interested in image-Encryption-dna-encoding are comparing it to the libraries listed below
Sorting:
- 基于混沌系统和DNA编码的彩色数字图像加密、解密、抗噪声性能分析以及抗裁剪性能分析☆131Updated 5 years ago
- This repository includes all implementations about the experiments mentioned in our published manuscript. If there has any problems, plea…☆13Updated 5 years ago
- Iris recognition using applied machine learning on CASIA iris images dataset☆63Updated 6 years ago
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆123Updated 4 years ago
- Image Encryption using arnold cat map for pixel shuffling and Henon Map for pixel value transformation.☆45Updated 7 years ago
- ☆11Updated 2 years ago
- Computer vision web application, built to predict the age, race, and gender of all individuals present in an image. Trained using PyTorch…☆19Updated 2 years ago
- Train GAN model ref NTU MLDS. 李宏毅老师的二次元人脸/头像数据集☆10Updated 4 months ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆42Updated 5 years ago
- Adversarial attack to detectors☆47Updated 4 years ago
- The binary classification problem focused on first IEEE Image forensics challenge-phase 1, to predict the given image is pristine or mani…☆14Updated 6 years ago
- For the CIFAR-10 dataset, extracting HOG features and using SVM classifier to classify them, at last, we get the accuracy.☆42Updated 5 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- ☆43Updated 4 years ago
- Image forgery detection using convolutional neural networks. Group 10's final project for TU Delft's course CS4180 Deep Learning 2019.☆170Updated 2 years ago
- computer vision practise☆22Updated 3 years ago
- ☆23Updated 5 years ago
- The goal of this project was to develop a Face Recognition application using a Local Binary Pattern approach and, using the same approach…☆28Updated 4 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆32Updated 4 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆90Updated 2 years ago
- Face recognition with loss of softmax, sphereface, cosface, arcface in pytorch of python3☆10Updated 5 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆135Updated 4 years ago
- In this repository there are implementations of many Copy-Move forgery detection (CMFD) methods.☆47Updated 7 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Updated 6 years ago
- Masked face recognition focuses on identifying people using their facial features while they are wearing masks. We introduce benchmarks o…☆35Updated 2 years ago
- ☆41Updated 3 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆89Updated 6 years ago
- Image Classification using SVM☆23Updated 6 years ago
- 2020 Undergraduate Graduation Project in Jiangnan University ALL codes including Data-convert, keras-Train, model-Evaluate and Web-App☆35Updated 2 years ago
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆69Updated 4 years ago