Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
Figure 6
The shadow generated by and the verification result of the submitted shares. (a) s1c1. (b) s1c2 (c) s1c3 (d) s1c4. (e) s1c5 (f) s1c6 (g) s1c7 (h) s1c8. (i) wro (j) lsb (s2c1), (k) lsb (s2c1) ⊕ lsb (s2c2), (l) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3), (m) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3) ⊕ lsb (s2c4), (n) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3) ⊕ lsb (wro), (o) lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3) ⊕ lsb (s2c4), (p) lsb (s2c2) ⊕ lsb (s2c1) ⊕ lsb (s2c3) ⊕ lsb (s2c4), (q) lsb (s2c3) ⊕ lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c4), (r) lsb (s2c4) ⊕ lsb (s2c1) ⊕ lsb (s2c2) ⊕ lsb (s2c3).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |
(q) |
(r) |