Cryptography Reference
In-Depth Information
FIGURE 4.18
Examples of the output with density pattern using 3 3. The upper image is
the encrypted shadow 2 and the lower image is the secret image reconstructed
by superimposing the two shadows by computer simulation.
Search WWH ::
Custom Search