Featured Post

Efficient Duplicate Image Removal: Using ImageDeDup Python

Efficient Duplicate Image Removal: A Python Guide In this blog post, we will walk you through the process of identifying and removing duplicate images from your directories using Python. We will leverage perceptual hashing to find similar images and delete duplicates while keeping the largest file in the group. This solution is perfect for users who want to save disk space and keep their image collections organized. Why You Should Use This Code Over time, especially when dealing with large collections of images, duplicate files can accumulate. These duplicates take up unnecessary space on your system. Manually sifting through these images can be tedious, but with the help of Python, perceptual hashing, and concurrent processing, this task becomes much easier. Benefits: Efficient Duplicate Detection : By using perceptual hashing (PHash), the code compares images based on their v...

Cryptography or Cryptology + Encryption + Decryption

Cryptography is the study of hiding information. Cryptology is kind of synonym for encryption i.e. the conversion of certain information from readable state to a nonsense state. The information encrypted can be decrypted with (i.e. changing the nonsense information into a sensible information) a key which is set by the person during time of encryption.

Basic terms of cryptography:

Plain-text and Cipher-text
The plaintext is a input data to the encryption algorithm and encrypted using cipher. The text after processing than gets converted to a ciphertext which can be decrypted using cipher (or cypher are the pair of algorithms which help in encryption and decryption)  for it. The ciphertext cananot be read by a human or computer unless the the cipher is available with them to decrypt it.

Decryption
It is a process by which the ciphertext is made to covert to a plaintext.

Cryptanalysis
It is the method of studying the encrypted nonsense data such that the cipher which was applied on it to encrypt it can be detected and the data can be produced into readable form.






Comments

Related Posts

Entity Attribute Value Model