Research Article

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT

Figure 4

Visual performances of embedded images and extracted under different intensity indicator values. The first and third columns are embedded images; the second and fourth columns are extracted . (a)  = 5; (b)  = 5; (c)  = 10; (d)  = 10; (e)  = 15; (f)  = 15; (g)  = 20; (h)  = 20; (i)  = 25; (j)  = 25; (k)  = 30; (l)  = 30.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)