Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Figure 6

The shadow generated by and the verification result of the submitted shares. (a) s1c1. (b) s1c2 (c) s1c3 (d) s1c4. (e) s1c5 (f) s1c6 (g) s1c7 (h) s1c8. (i) wro (j) lsb (s2c1), (k) lsb (s2c1) ⊕ lsb (s2c2), (l) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3), (m) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3) ⊕ lsb (s2c4), (n) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3) ⊕ lsb (wro), (o) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3) ⊕ lsb (s2c4), (p) lsb (s2c2) ⊕ lsb (s2c1) ⊕ lsb (s2c3) ⊕ lsb (s2c4), (q) lsb (s2c3) ⊕ lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c4), (r) lsb (s2c4) ⊕ lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3).
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)