Cryptography Reference
In-Depth Information
B e
Ä
B w
=
B e
B b
=
Ä
B i
Ä
B w
=
B i
B b
=
Ä
FIGURE 3.19
Stacking results of the chosen visual patterns for Feng et al.'s scheme.
Table 3.9 lists a possible set of encoded patterns for s A , s A , s A , and s B ;
and their stacked results for x = 3. The reason that pi i is reconstructed by
s A s B is precisely explained in this table. Surely, each set of the encoded
pattern could be permuted correspondingly to accomplish the randomness for
the whole shares.
TABLE 3.9
Possible set of encoded patterns for s A , s A , s A , and s B ; and their
stacked results for x = 3.
p 1 p 2 p 3 s A
s A
s A
s B s A s B s A s B s A s B
 
 
Search WWH ::




Custom Search