Cryptography Reference
In-Depth Information
(a) the secret image of size 12864
(b) the first shadow S 1
(c) the second shadow S 2
(d) the recovered image of size 256128
Fig. 4.3. An example of (2, 2)-VSS scheme.
Search WWH ::




Custom Search