Research Article

On the Value of Order Number and Power in Secret Image Sharing

Algorithm 1

Shadow image security evaluation algorithm.
Input: original image, Shadow images
Output: evaluating indicator
Step 1: statistics of the distribution and probability of the pixels in the original secret images.
Step 2: is obtained by counting the pixels of the corresponding location of in shadow image.
Step 3: calculate the variance of to get .
Step 4: get the weighted variance of a single pixel through .
Step 5: add up all and output Evaluating indicator .