Research Article
Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things
| Scheme | Our scheme | [30] | [22] | [12] | [13] | [14] |
| Information hiding | YES | YES | YES | NO | NO | NO | Decentralized | NO | NO | NO | YES | YES | YES | Channel security | YES | YES | NO | NO | NO | NO | Impersonation attack | YES | YES | YES | YES | YES | YES | Replay attack | YES | YES | YES | YES | YES | YES | Hierarchical access | YES | NO | NO | NO | NO | NO |
|
|