Research Article

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT

Figure 5

Visual performances of the original image under LSBs replacement attacks: (a) setting 3 LSBs to zero; (b) setting 4 LSBs to zero; (c) setting 5 LSBs to zero.
(a)
(b)
(c)