Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
| Number | Symbols | Description |
| 1 | | Secret image | 2 | | Authentication image | 3 | | Divisible parameters | 4 | lsb | Least significant bit processing | 5 | | Stacking operation | 6 | | XOR operation | 7 | | Image width | 8 | | Image height | 9 | | Round down | 10 | | Shares generated by | 11 | | Shadows of | 12 | | Share of third party | 13 | | Subimage of secret image | 14 | | The remainder of divided by |
|
|