Verification protocol for data storage or transmission: Ghost writing the whip

“Ghost imaging” sounds like the spooky stuff of frivolous fiction, but it’s an established technique for reconstructing hi-res images of objects partly obscured by clouds or smoke. Now a group of researchers is applying the same idea in reverse to securing stored or shared electronic data. Their work establishes “marked ghost imaging” technology as a new type of multi-layer verification protocol for data storage or transmission.

Read more: Verification protocol for data storage or transmission: Ghost writing the whip

Story added 24. June 2014, content source with full text you can find at link above.