Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
Figure 5
S2 generated shares and the processing results of all shares. (a) S2. (b) S1. (c) s2c1. (d) s2c2 (e) s2c3 (f) s2c4. (g) s2c5 (h) s2c6 (i) s2c7 (j) s2c8. (k) lsb(s2c1) (l) lsb(s2c2) (m) lsb(s2c3) (n) lsb(s2c4). (o) lsb(s2c5) (p) lsb(s2c6) (q) lsb(s2c7) (r) lsb(s2c8)
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |
(q) |
(r) |