Research Article
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
Table 3
The comparative analysis.
| | (1) | (2) | (3) | (4) | (5) | (6) | (7) | (8) | (9) |
| [10] | | | | MP and polynomial | — | | — | — | — | [16] | | | | MP and polynomial | — | | — | — | — | [15] | | | | 1D-CA | LSB | | 1/4 | 47.12 | 0.99815 | [17] | | | | Polynomial | ME | | | 49.47 | — | [12] | | | | 2D-CA and polynomial | LSB | (Dynamic) | (Dynamic) | 54.55 | 0.99996 | Ours | | | | 2D-CA and MP | ME | | | 66.35 | 0.999996 |
|
|