Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
| | Scheme | Our scheme | [30] | [22] | [12] | [13] | [14] |
| | Information hiding | YES | YES | YES | NO | NO | NO | | Decentralized | NO | NO | NO | YES | YES | YES | | Channel security | YES | YES | NO | NO | NO | NO | | Impersonation attack | YES | YES | YES | YES | YES | YES | | Replay attack | YES | YES | YES | YES | YES | YES | | Hierarchical access | YES | NO | NO | NO | NO | NO |
|
|