Research Article
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
Table 1
The stego images and the reconstructed images.
| Secret image | | Cover image | | | | SI | CI01 | CI02 | CI03 | | | Stego image | | | | | | ste01 | ste02 | ste03 | | | PSNR | 66.40 | 67.03 | 66.71 | | | SSIM | 0.999996 | 0.999997 | 0.999996 | | | Diff | 227/65536 | 223/65536 | 215/65536 | | | Rec image | | | | | | Rec-SI | Rec-CI01 | Rec-SI (×) | | | PSNR | | | — | | | SSIM | 1 | 1 | — | | | Diff | 0/65536 | 0/65536 | 65420/65536 |
|
|