Cryptography Reference
In-Depth Information
(a) the secret image of size 12864
(b) the first shadow S
1
(c) the second shadow S
2
(d) the recovered image of size 256128
Fig. 4.3.
An example of (2, 2)-VSS scheme.