Cryptography Reference
In-Depth Information
FIGURE 13.23
DHSED-generated Y
2
(L = 5) of Ramp with respect to X in
Figure 13.14,
W
in
Figure 13.15
and Y
1
in
Figure 13.16.
FIGURE 13.24
Image Y obtained by overlaying Y
1
in
Figure 13.16
and Y
2
in Figure 13.23.
Previous Page
Next Page
Visual Cryptography and Secret Image Sharing
Search WWH ::
Custom Search
Home