wanatpj / h_blindLinks
Extraction of watermark embedded with E_BLIND method on multiple digital works.
☆12Updated 9 years ago
Alternatives and similar repositories for h_blind
Users that are interested in h_blind are comparing it to the libraries listed below
Sorting:
- An experimental version of the BQ client which adds client-side encryption☆175Updated 7 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- DWT image watermarking☆18Updated 8 years ago
- Talos: Encrypted Query Processing for the Internet of Things (Source code of our paper at ACM SenSys 2015)☆14Updated 9 years ago
- Libraries for fully homomorphic encryption☆80Updated 9 years ago
- Python implementation of C2PA: Coalition for Content Provenance and Authenticity.☆39Updated 3 years ago
- Personal Information Exfiltration Detection Using Machine Learning☆29Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆136Updated 2 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 8 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆37Updated 7 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 10 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated last year
- Apache Milagro (Incubating)☆42Updated last year
- Secret sharing library in Java for the Archistar multi-cloud storage system☆47Updated 7 years ago
- A system for securely splitting secrets with Shamir's Secret Sharing Scheme☆511Updated 3 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- Robust video watermarking with non-differentiable adversaries.☆298Updated 3 years ago
- A cryptographic method that defends against side-channel attacks☆25Updated 8 years ago
- Javascript JPEG steganography library. Includes JS JPEG encoder and decoder with coefficient access helper functions.☆34Updated 11 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 7 years ago
- misc stuff☆19Updated 8 years ago
- [OPEN SOURCE Digital Forensics Tool] - State of the Art Image/Video Forensics Tool : Hybrid-G-PRNU-Extractor based on the work of Muammar…☆11Updated 5 years ago
- A database system that can process SQL queries over encrypted data.☆517Updated 8 years ago
- Prototype of a system for metadata-hiding communication for whistleblowers☆20Updated 5 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- ☆233Updated 6 years ago
- ☆34Updated 5 years ago
- RAPPOR: Privacy-Preserving Reporting Algorithms☆865Updated 3 years ago
- Repository for building the Sharemind SDK☆16Updated 2 years ago
- IOTA's hash function curl is broken☆172Updated 5 years ago