Verification protocol for data storage or transmission: Ghost writing the whip
“Ghost imaging” sounds like the spooky stuff of frivolous fiction, but it’s an established technique for reconstructing hi-res images of objects partly obscured by clouds or smoke. Now a group of researchers is applying the same idea in reverse to securing stored or shared electronic data. Their work establishes “marked ghost imaging” technology as a new type of multi-layer verification protocol for data storage or transmission.
Incoming search terms