Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Figure 3

Case 3: threshold SISS without a third party when there is no fake participant.