Skip to main content

Table 1 Comparison between the proposed scheme and Yang et al.’s scheme

From: Applying cheating identifiable secret sharing scheme in multimedia security

 

Yang et al.’s scheme

Proposed scheme

Pixel number in each block

\(\frac {k(k+1)}{2}\)

\(k+\left \lfloor \frac {k-2}{2}\right \rfloor \)

Shadow size

\(\frac {2}{k+1}\)

\(\frac {2}{k+\left \lfloor \frac {k-2}{2}\right \rfloor }\)

CI (k participants)

Failed

\(t\leq \left \lfloor \frac {k-2}{2}\right \rfloor \)

CI (n participants)

\(t\leq \left \lfloor \frac {n-1}{2}\right \rfloor \)