Cryptography Reference
In-Depth Information
In the first experiment, the proposed (2, 2)-VSS scheme is implemented
and tested on an input image of size 512512, which is shown in Fig. 4.13(a).
The image consists of eight secret images. The codebooks C 0 and C 1 used in
the experiment are
0, 0, 1, 1
1, 1, 0, 0
0, 1, 0, 1
1, 0, 1, 0
0, 1, 1, 0
1, 0, 0, 1
,
,
C 0 =
and
1, 0, 0, 1
0, 1, 1, 0
1, 0, 1, 0
0, 1, 0, 1
1, 1, 0, 0
0, 0, 1, 1
,
,
0, 0, 1, 1
0, 0, 1, 1
0, 1, 0, 1
0, 1, 0, 1
0, 1, 1, 0
0, 1, 1, 0
,
,
C 1 =
.
1, 0, 0, 1
1, 0, 0, 1
1, 0, 1, 0
1, 0, 1, 0
1, 1, 0, 0
1, 1, 0, 0
,
,
After the encryption process, the scheme generates the two shadows shown
in Fig. 4.13(b) and Fig. 4.13(c). Following the decryption process, the recon-
structed image is obtained and is shown in Fig. 4.13(d).
Fig. 4.13. The (2, 2)-VSS scheme on the input image of size 512512.
Search WWH ::




Custom Search