Research Article
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT
Figure 5
Visual performances of the original image under LSBs replacement attacks: (a) setting 3 LSBs to zero; (b) setting 4 LSBs to zero; (c) setting 5 LSBs to zero.
(a) |
(b) |
(c) |