From: Applying cheating identifiable secret sharing scheme in multimedia security
Yang et al.’s scheme | Proposed scheme | |
---|---|---|
Pixel number in each block | \(\frac {k(k+1)}{2}\) | \(k+\left \lfloor \frac {k-2}{2}\right \rfloor \) |
Shadow size | \(\frac {2}{k+1}\) | \(\frac {2}{k+\left \lfloor \frac {k-2}{2}\right \rfloor }\) |
CI (k participants) | Failed | \(t\leq \left \lfloor \frac {k-2}{2}\right \rfloor \) |
CI (n participants) | \(t\leq \left \lfloor \frac {n-1}{2}\right \rfloor \) |