Research Article
A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction
Table 3
Comparisons of LSBC and modulus operation.
|
Methods | Features | Operation type | Computation cost | Without overflow issue | Utilize all pixels from a cover image | Affecting the selection of threshold values | Affected by the selection of threshold values |
| LSBC | Logical shift operation | Relatively low | Yes | Yes | No | No |
| Modulus operation | Modulus operation | Relatively high | No | No | Yes | Yes |
|
|