Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Table 1

Related symbols.

NumberSymbolsDescription

1Secret image
2Authentication image
3Divisible parameters
4lsb Least significant bit processing
5Stacking operation
6XOR operation
7Image width
8Image height
9Round down
10Shares generated by
11Shadows of
12Share of third party
13Subimage of secret image
14The remainder of divided by