Web app using Streamlit to implement various substitution and transposition cipher techniques. Users can input plaintext, select a cipher (like Caesar, Vigenère, or Hill), enter relevant parameters, ...
Abstract: The rapid proliferation and extensive application of image data have made image encryption technology increasingly important in the field of information security. This article reports a ...
Abstract: Nowadays, large numbers of private images are stored in the cloud, which may be recognized by unauthorized models, seriously threatening users' privacy security. Although adversarial example ...