Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Figure 2

Case 2: threshold SISS with a third party when there is a fake participant.