Research Article

Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things

Table 4

Security comparison.

SchemeOur scheme[30][22][12][13][14]

Information hidingYESYESYESNONONO
DecentralizedNONONOYESYESYES
Channel securityYESYESNONONONO
Impersonation attackYESYESYESYESYESYES
Replay attackYESYESYESYESYESYES
Hierarchical accessYESNONONONONO