Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
FIGURE 3.23
Transforming circle shares (a) and (b) into cylinder counterparts (c) and (d),
respectively.
TABLE 3.10
Comparison of visual multiple secrets sharing schemes.
schemes
x
m contrast
shares' shape
Wu and Chen [12]
2
4
1/4
square
Wu and Chang [13]
2
4
1/4
square
Feng et al.[3]
2
3x
1/3x
cylinder
Shyu et al.[8]
2
2x
1/2x
circle
or
cylinder
 
 
Search WWH ::




Custom Search