Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10342514 | Journal of Systems and Software | 2013 | 11 Pages |
Abstract
⺠A self-authentication capability for secrets is developed by using secret sharing. ⺠A receiver can confirm the correctness of the extracted secret message. ⺠The method explores a new cover medium to perform covert communication. ⺠The method is only one having the capability against active and passive attacks.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Che-Wei Lee, Wen-Hsiang Tsai,