Mathematical Problems in Engineering / 2015 / Article / Tab 2

Research Article

A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction

Table 2

Comparisons with previous perfect reversible schemes.

SchemesFunctionality
Computation complexitySteganographic methodWithout extra expansion/storageDynamic embeddingPSNR (dB)Maximum capacity (pixels)

Lin et al. [24]Modulus operationYesNo43.38

Chang et al. [25]Sudoku tableNoNo47.13

Lin and Chan [26]Modulus operationYesNo47.81

Wu et al. [27]Modulus operationYesNo37.99

Hu et al. [22]LSBCYesYes51.86

OursLSBCYesYes51.15

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.