Article ID Journal Published Year Pages File Type
10342514 Journal of Systems and Software 2013 11 Pages PDF
Abstract
► A self-authentication capability for secrets is developed by using secret sharing. ► A receiver can confirm the correctness of the extracted secret message. ► The method explores a new cover medium to perform covert communication. ► The method is only one having the capability against active and passive attacks.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,