{"payload":{"header_redesign_enabled":false,"results":[{"id":"112637792","archived":false,"color":"#f34b7d","followers":40,"has_funding_file":false,"hl_name":"codeShaurya/Image-encryption","hl_trunc_description":"Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":112637792,"name":"Image-encryption","owner_id":24356230,"owner_login":"codeShaurya","updated_at":"2018-10-02T20:13:57.965Z","has_issues":true}},"sponsorable":false,"topics":["opencv","encryption","encryption-algorithms","image-encryption","logistic-map"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":48,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AcodeShaurya%252FImage-encryption%2B%2Blanguage%253AC%252B%252B","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/codeShaurya/Image-encryption/star":{"post":"2Osxy8h87gwtk_27pzVsQjvMc9Vh0xYvQmVktE3zZiHXtH8vFtNoW6vmRSDeyJlFY15oQvrqSZ6RKyG4qi_gVw"},"/codeShaurya/Image-encryption/unstar":{"post":"orMLrbVEUUJcaJM_WpE4F2PGFiQDDvhCGYRL9GfpFdDWEJ5nLXvRNc2PxyX_4gWHor4mhLzHymuKuBw-K3xBrA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"EhCKfUoGNQbuvTur5yVMloOoD24h44Dxfr4Y_Mxsdbu8RFLO-a8dkcB3KIZ-n0tEiGrO1wc6v0Lc0AabwU5l2Q"}}},"title":"Repository search results"}