Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Figure 5

S2 generated shares and the processing results of all shares. (a) S2. (b) S1. (c) s2c1. (d) s2c2 (e) s2c3 (f) s2c4. (g) s2c5 (h) s2c6 (i) s2c7 (j) s2c8. (k) lsb(s2c1) (l) lsb(s2c2) (m) lsb(s2c3) (n) lsb(s2c4). (o) lsb(s2c5) (p) lsb(s2c6) (q) lsb(s2c7) (r) lsb(s2c8)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)