Research Article
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT
Figure 4
Visual performances of embedded images and extracted under different intensity indicator values. The first and third columns are embedded images; the second and fourth columns are extracted . (a) = 5; (b) = 5; (c) = 10; (d) = 10; (e) = 15; (f) = 15; (g) = 20; (h) = 20; (i) = 25; (j) = 25; (k) = 30; (l) = 30.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |