Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
| | Number | Symbols | Description |
| | 1 | | Secret image | | 2 | | Authentication image | | 3 | | Divisible parameters | | 4 | lsb | Least significant bit processing | | 5 | | Stacking operation | | 6 | | XOR operation | | 7 | | Image width | | 8 | | Image height | | 9 | | Round down | | 10 | | Shares generated by | | 11 | | Shadows of | | 12 | | Share of third party | | 13 | | Subimage of secret image | | 14 | | The remainder of divided by |
|
|