From: Steganographic secret sharing via AI-generated photorealistic images
Scheme | Steganographic methodology | Application | Cheater detectability | Access threshold |
---|---|---|---|---|
Ours | Generative | Access control | ✓ | (k, n) |
[23] | Generative | Access control | ✓ | (2, 2) |
[22] | Generative | Convert communications | – | – |
[13] | Selective | Convert communications | – | – |
[14] | Selective | Convert communications | – | – |
[17] | Selective | Convert communications | – | – |
[19] | Selective | Convert communications | – | – |