Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
Table 3
Comparison of our scheme, scheme [
30], and scheme [
22].
| Scheme | Our scheme | [30] | [22] |
| Authentication operation | VCS (XOR/OR) | Common value | Common value | Pixel expansion | NO | NO | YES | Restructure | Lagrange | Lagrange | Lagrange | Reconstruction quality | Losses | Loss | Loss |
|
|