Cryptography Reference
In-Depth Information
A
Programs Relating to Topics of This Topic
A.1 Messages from the Editors
Authors from five chapters in this topic contributed their executables and/or
source codes relating to the topics of their chapters. These programs are gath-
ered in the CD attached to this topic. Please contact authors in the chapters
cited below for further discussions.
A.2 The Programs
These programs are put in five directories in the attached CD. They are briefly
described as follows.
A.2.1 Programs Relating to Bit-Level Visual Secret Sharing
Scheme for Multi-Secret Images Using Rotation and Reversion
Operations
Authors in Chapter 4 offered their source codes and executables relating to
their topics. These codes are offered in the attached CD under the directory:
\ IMDH \ Demo \ Ch04 \
A.2.2 Programs Relating to Adaptive Data Hiding Scheme
for Palette Images
Authors in Chapter 5 offered their source codes and executables relating to
their topics. These codes are offered in the attached CD under the directory:
\ IMDH \ Demo \ Ch05 \
Search WWH ::




Custom Search