Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Figure 8

Line graph of shadow encryption efficiency under different thresholds.