Research Article

A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction

Table 2

Comparisons with previous perfect reversible schemes.

SchemesFunctionality
Computation complexitySteganographic methodWithout extra expansion/storageDynamic embeddingPSNR (dB)Maximum capacity (pixels)

Lin et al. [24]Modulus operationYesNo43.38

Chang et al. [25]Sudoku tableNoNo47.13

Lin and Chan [26]Modulus operationYesNo47.81

Wu et al. [27]Modulus operationYesNo37.99

Hu et al. [22]LSBCYesYes51.86

OursLSBCYesYes51.15