Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Table 3

Comparison of our scheme, scheme [30], and scheme [22].

SchemeOur scheme[30][22]

Authentication operationVCS (XOR/OR)Common valueCommon value
Pixel expansionNONOYES
RestructureLagrangeLagrangeLagrange
Reconstruction qualityLossesLossLoss