From: Steganographic secret sharing via AI-generated photorealistic images
Symbols | Descriptions |
---|---|
Gen | Generator |
Enc | Encoder |
Dec | Decoder |
Ext | Extractor |
\({\varvec{m}}\) | \(1 \times \ell_{m}\) sized binary secret message |
\(m\) | Decimal secret message converted by \({\varvec{m}}\) |
\(s\) | Decimal secret share |
\({\varvec{s}}\) | \(1 \times \ell_{{\text{s}}}\) sized binary secret share converted by \(s\) |
RS(\({\varvec{s}}_{i}\)) | \(1 \times \ell\) sized R–S encoded binary secret share |
\({\varvec{\eta}}\) | \(1 \times \ell\) sized modulated noise-like secret share |
\({\varvec{I}}\) | \(64 \times 64 \times 3\) sized image share |
\({\varvec{c}}\) | \(1 \times 64\) sized binary authentication code |
\({\varvec{C}}\) | \(64 \times 64\) sized binary two-dimensional authentication code |
\({\varvec{I}}^{\prime }\) | \(64 \times 64 \times 3\) sized authentic image share |
\(\hat{\user2{I}}^{\prime }\) | \(64 \times 64 \times 3\) sized query image share |
\(\hat{\user2{C}}\) | \(64 \times 64\) sized binary two-dimensional query code |
\(\hat{\user2{c}}\) | \(1 \times 64\) sized binary query code |
\(\hat{\user2{\eta }}\) | \(1 \times \ell\) sized extracted noise-like secret share |
\(RS\left( {\hat{\user2{s}}} \right)\) | \(1 \times \ell\) sized de-modulated R–S encoded secret share |
\(\hat{\user2{s}}\) | \(1 \times \ell_{{\text{s}}}\) sized binary secret share recovered by R-S code |
\(\hat{s}\) | Decimal secret share converted by \(\hat{\user2{s}}\) |
\(\hat{m}\) | Recalculated decimal secret message |
\(\hat{\user2{m}}\) | \(1 \times \ell_{m}\) sized binary secret message converted by \(\hat{m}\) |
\(\ell\) | Length of R–S encoded binary secret share |
\(\ell_{s}\) | Length of binary secret share |
\(\ell_{m}\) | Length of binary secret message |