Skip to main content

Table 1 Comparison between the proposed scheme and Yang et al.’s scheme

From: Applying cheating identifiable secret sharing scheme in multimedia security

  Yang et al.’s scheme Proposed scheme
Pixel number in each block \(\frac {k(k+1)}{2}\) \(k+\left \lfloor \frac {k-2}{2}\right \rfloor \)
Shadow size \(\frac {2}{k+1}\) \(\frac {2}{k+\left \lfloor \frac {k-2}{2}\right \rfloor }\)
CI (k participants) Failed \(t\leq \left \lfloor \frac {k-2}{2}\right \rfloor \)
CI (n participants) \(t\leq \left \lfloor \frac {n-1}{2}\right \rfloor \)