Cryptography Reference
In-Depth Information
FIGURE 13.12
DHCED-generated Y
2
(T = 10) of Pepper with respect to X
2
in
Figure 13.11,
W in
Figure 13.5,
and Y
1
in
Figure 13.4.
FIGURE 13.13
Image Y obtained by overlaying Y
1
in
Figure 13.4
and Y
2
in Figure 13.12.
Previous Page
Next Page
Visual Cryptography and Secret Image Sharing
Search WWH ::
Custom Search
Home