Visual cryptography algorithms for grayscale images, to accompany the book "Improving Image Quality in Visual Cryptography"
☆13May 22, 2019Updated 6 years ago
Alternatives and similar repositories for GrayscaleVisualCryptography
Users that are interested in GrayscaleVisualCryptography are comparing it to the libraries listed below
Sorting:
- An Image is divided into N different shares using KN Secret Sharing Algorithm. These N shares can be distributed but, the end user needs…☆33Jul 2, 2017Updated 8 years ago
- The source code of "A Novel Image Tamper Detection and Self-recovery Algorithm Based on Watermarking and Chaotic System"☆11Apr 22, 2021Updated 4 years ago
- PRA-TPE: Perfectly recoverable approximate thumbnail-preserving image encryption☆11Mar 24, 2022Updated 3 years ago
- QR code visual cryptography pipeline☆14Jul 7, 2020Updated 5 years ago
- Diploma Thesis Project on Emotion Recognition from EEG-signals☆13Sep 17, 2019Updated 6 years ago
- 基于位平面压缩和直方图平移法的图像可逆信息隐藏算法☆16Jul 11, 2019Updated 6 years ago
- Implementation of Reversible Data Hiding technique☆12Oct 28, 2016Updated 9 years ago
- A Blockchain Implementation in MATLAB.☆12May 1, 2023Updated 2 years ago
- Estimate maximum Lyapunov exponent for short time series using Rosenstein, et al. method☆12Jul 26, 2015Updated 10 years ago
- A human detection system is developed on Matlab and FPGA: The 130x66 RGB pixels of static input image was attracted features and classifi…☆12Jan 5, 2023Updated 3 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆15Dec 11, 2020Updated 5 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- ☆17Jun 14, 2017Updated 8 years ago
- This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labelin…☆18Dec 11, 2020Updated 5 years ago
- Affective EEG-Based Person Identification Using the Deep Learning Approach (IEEE Transactions on Cognitive and Developmental Systems)☆17Oct 23, 2019Updated 6 years ago
- ☆22Apr 16, 2025Updated 10 months ago
- Visual Cryptography implementation as part of Cryptography course project (CS350 and CS353)☆24Mar 23, 2021Updated 4 years ago
- ☆30Mar 11, 2021Updated 4 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Dec 11, 2020Updated 5 years ago
- A simple Matlab implementation of the algorithm presented in the paper: "Reversible-data-hiding-in-Encrypted-image"☆23Sep 6, 2019Updated 6 years ago
- Discrete wavelet transform based image watermarking approach along with chaotic map based encryption of watermarks☆25Oct 1, 2021Updated 4 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆27Oct 9, 2020Updated 5 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 6 years ago
- Format preserving string substitution encryption☆29Feb 25, 2025Updated last year
- clean data ,feature selection , svm based kdd99☆26Oct 18, 2019Updated 6 years ago
- Source code for 'Dynamical Systems with Applications using MATLAB®, 2ed' by Stephen Lynch http://www.springer.com/book/9783319068190☆33Sep 23, 2020Updated 5 years ago
- NotesTeX (or its nickname NoTeX) is a simple LaTeX notes taking package for students.☆28Jan 4, 2024Updated 2 years ago
- HEAAN lib binds for Python☆32Aug 27, 2020Updated 5 years ago
- Homomorphic encryption test☆23Aug 2, 2019Updated 6 years ago
- ☆45Updated this week
- An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding.☆50Oct 13, 2023Updated 2 years ago
- Client/Server framework for encrypted machine learning using homomorphic encryption☆43Oct 1, 2021Updated 4 years ago
- Notebooks for the Image Processing videos☆47Jun 7, 2021Updated 4 years ago
- A data-driven method to calculate the Lyapunov exponent of a dynamical system employing a GRU-RNN.☆47Jul 25, 2024Updated last year
- Using machine learning to replicate chaotic attractors and calculate Lyapunov exponents from data. Chaos 27, 121102 (2017); https://doi.o…☆50Mar 27, 2020Updated 5 years ago
- pure Python format preserving encryption☆54May 12, 2019Updated 6 years ago
- Material for a full course on applied nonlinear dynamics, nonlinear timeseries analysis, and complex systems, in Julia☆66Aug 22, 2024Updated last year
- Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn☆59Apr 1, 2017Updated 8 years ago