• No results found

Secure and Efficient Steganography Scheme using 2 out of 2 Secret Sharing Method

N/A
N/A
Protected

Academic year: 2020

Share "Secure and Efficient Steganography Scheme using 2 out of 2 Secret Sharing Method"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1. Codebook for 2-out of 2 VSS scheme.
Figure 2- Flow Diagram of Proposed approach
Figure 3- Example of Meaningful shares used for embedding of secret message
Figure 4- Example of tamper on the share, alteration detection

References

Related documents

A range of conjugated (sulphated and glucuronidated) and free metabolites of vitamin E were synthesised chemically and used to a) confirm the identity of a-CMBHC, b)

Ni/A1,0, has a similar catalytic activity to Pt black and Pd black in this exchange reaction, but with Ni lSi0 and Nilkieselguhr there is no exchange of hydrogen in

already has supervisory authority over depository institutions with over $10 billion in assets and their affiliates, as well as nonbanks that offer or provide private education

Growth on AlN/4H-SiC ( 11 2 0 ) substrates of coalesced, non-polar GaN ( 11 2 0 ) films having volumes of material with reduced densities of dislocations and stacking faults has

basic commutators and the irreducible polynomials over a certain finite field.. Keywords: cohomology, spectral sequences, central series, profinite groups,

However, the loose knot can tighten during pregnancy due to fetal movements or during delivery, leading to decreased blood flow through umbilical cord and consequent

4 that when the Gaussian beam is allowed to propagate through nonlocal nonlinear medium, it propagate without changing the shape while the SG beam has shown oscillatory

(iv) Virtual congestion measure for node 2, (v) queue lengths for various nodes, and (vi) next hop at node 3, as time progresses. The table also shows that the