Skip to main content

Table 4 Comparison of scheme characteristics

From: Steganographic secret sharing via AI-generated photorealistic images

Scheme

Steganographic methodology

Application

Cheater detectability

Access threshold

Ours

Generative

Access control

✓

(k, n)

[23]

Generative

Access control

✓

(2, 2)

[22]

Generative

Convert communications

–

–

[13]

Selective

Convert communications

–

–

[14]

Selective

Convert communications

–

–

[17]

Selective

Convert communications

–

–

[19]

Selective

Convert communications

–

–