user163 / image-encryptionLinks
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆97Updated 2 months ago
- ☆32Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- 《信息内容安全》课程设计——搜索引擎☆13Updated 5 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆25Updated last year
- 华中科技大学网络空间安全学院2019级密码学课程设计☆11Updated 3 years ago
- PassLock is a highly secured password manager that encrypts passwords using Advanced Encryption Standards (AES)☆65Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆47Updated last month
- This is a project in cryptography that involves implementing image encryption using various chaos maps and comparing their merits based o…☆120Updated 3 years ago
- A collection of academic papers / Git repos / conference talks / frameworks / tools related to cellular security and privacy.☆148Updated last month
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆242Updated 3 years ago
- Android Malware Detection Using Machine Learning Classifiers ( Using Permissions requested by Apps)☆55Updated 2 years ago
- A large-scale database of malicious software images☆47Updated 3 years ago
- ☆21Updated last year
- 基于陈氏超混沌系统和DNA编码的图像加密算法☆26Updated 2 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆62Updated 5 months ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆27Updated 4 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆45Updated 8 months ago
- ☆30Updated 7 years ago
- 西安电子科技大学(西电)网络与信息安全学院 2019 级操作系统实验报告 by arttnba3☆42Updated last year
- ☆22Updated 6 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆145Updated last year
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 4 months ago
- ☆24Updated last year
- A Deep Learning framework that analyses Windows PE files to detect malicious Softwares.☆73Updated 2 years ago
- Advance Image Steganography☆130Updated 3 years ago
- A list of awesome malware detection tools☆75Updated 2 years ago
- ☆20Updated 3 years ago