The increased use of computer and internet had been associated with the wide use of multimedia data. The need for protecting these data has risen dramatically. To prevent the confidential information from being tampered with, one needs to apply some cryptographic techniques. Most of cryptographic methods have one similar weak point which is the data is centralized. To overcome this problem secret sharing was introduced. In this book compressive audio secret sharing based on transform coding and hyper-planes representation have been introduced. The introduced compressive secret sharing scheme...
The increased use of computer and internet had been associated with the wide use of multimedia data. The need for protecting these data has risen dram...