Cryptography Reference
In-Depth Information
(a)
(b)
(c)
FIGURE 1.13
(a){(c) Another set of shares generated by the second method, q = 16, depict-
ing more pronounced artifacts. (Reprinted with permission from IEEE Trans.
Inf. Forensics Security, vol. 4, no. 3, pp. 383{396, Sep. 2009 c IEEE 2009).
 
 
Search WWH ::




Custom Search