The Research of Authentication-based Steganography in a Secret Sharing System

碩士 === 中央警察大學 === 資訊管理研究所 === 95 === The secret sharing is used the (t, n) secret sharing scheme, which is a so-called (t, n) threshold scheme, where t denotes the threshold value to reveal the secret and n is the total number of holding shadows. In essence, the secret is asked to be divided into n...

Full description

Bibliographic Details
Main Author: 林宜萱
Other Authors: 王旭正
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/buyvsg