14

Image Secret Sharing

WeiQi Yan, Jonathan Weir and Mohan S. Kankanhalli

Queen’s University Belfast, UK

National University of Singapore, Singapore

CONTENTS

14.1 Introduction

Cryptography plays a very vital enabling role in our modern computing infrastructure. Almost all real-world applications require keys (such as passwords) for the purposes of confidentiality, authentication, and nonrepudiation. The strength of such cryptographic ...

Get Visual Cryptography and Secret Image Sharing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.