Research Article
On the Value of Order Number and Power in Secret Image Sharing
Algorithm 1
Shadow image security evaluation algorithm.
| Input: original image, Shadow images | | Output: evaluating indicator | | Step 1: statistics of the distribution and probability of the pixels in the original secret images. | | Step 2: is obtained by counting the pixels of the corresponding location of in shadow image. | | Step 3: calculate the variance of to get . | | Step 4: get the weighted variance of a single pixel through . | | Step 5: add up all and output Evaluating indicator . |
|