14
Image Secret Sharing
WeiQi Yan, Jonathan Weir and Mohan S. Kankanhalli
Queen’s University Belfast, UK
National University of Singapore, Singapore
CONTENTS
14.1 Introduction
Cryptography plays a very vital enabling role in our modern computing infrastructure. Almost all real-world applications require keys (such as passwords) for the purposes of confidentiality, authentication, and nonrepudiation. The strength of such cryptographic ...
Get Visual Cryptography and Secret Image Sharing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.