Research Article
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
Table 2
PSNR and SSIM of different threshold and cover image.
| | PSNR | SSIM | 30 | 96 | 256 | 30 | 96 | 256 |
| k = 2 | 47.21 | 57.29 | 66.60 | 0.9996 | 0.99997 | 0.999996 | k = 3 | 47.39 | 57.29 | 66.35 | 0.9996 | 0.99997 | 0.999995 | k = 7 | 47.92 | 57.88 | 65.92 | 0.9997 | 0.99997 | 0.999995 | k = 15 | 48.10 | 57.97 | 65.63 | 0.9997 | 0.99996 | 0.999995 |
|
|