Skip to main content

Table 1 Descriptions of the main notations used in the proposed scheme

From: Steganographic secret sharing via AI-generated photorealistic images

Symbols

Descriptions

Gen

Generator

Enc

Encoder

Dec

Decoder

Ext

Extractor

\({\varvec{m}}\)

\(1 \times \ell_{m}\) sized binary secret message

\(m\)

Decimal secret message converted by \({\varvec{m}}\)

\(s\)

Decimal secret share

\({\varvec{s}}\)

\(1 \times \ell_{{\text{s}}}\) sized binary secret share converted by \(s\)

RS(\({\varvec{s}}_{i}\))

\(1 \times \ell\) sized R–S encoded binary secret share

\({\varvec{\eta}}\)

\(1 \times \ell\) sized modulated noise-like secret share

\({\varvec{I}}\)

\(64 \times 64 \times 3\) sized image share

\({\varvec{c}}\)

\(1 \times 64\) sized binary authentication code

\({\varvec{C}}\)

\(64 \times 64\) sized binary two-dimensional authentication code

\({\varvec{I}}^{\prime }\)

\(64 \times 64 \times 3\) sized authentic image share

\(\hat{\user2{I}}^{\prime }\)

\(64 \times 64 \times 3\) sized query image share

\(\hat{\user2{C}}\)

\(64 \times 64\) sized binary two-dimensional query code

\(\hat{\user2{c}}\)

\(1 \times 64\) sized binary query code

\(\hat{\user2{\eta }}\)

\(1 \times \ell\) sized extracted noise-like secret share

\(RS\left( {\hat{\user2{s}}} \right)\)

\(1 \times \ell\) sized de-modulated R–S encoded secret share

\(\hat{\user2{s}}\)

\(1 \times \ell_{{\text{s}}}\) sized binary secret share recovered by R-S code

\(\hat{s}\)

Decimal secret share converted by \(\hat{\user2{s}}\)

\(\hat{m}\)

Recalculated decimal secret message

\(\hat{\user2{m}}\)

\(1 \times \ell_{m}\) sized binary secret message converted by \(\hat{m}\)

\(\ell\)

Length of R–S encoded binary secret share

\(\ell_{s}\)

Length of binary secret share

\(\ell_{m}\)

Length of binary secret message