Research Article

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT

Algorithm 1

Authentication information embedding.
ā€‰Input: Encrypted shares of the image: and of size ; pseudorandom vectors and of length ; authentication information of size ; embedding intensity indicator .
ā€‰Output: Encrypted shares of the image with authentication information and .
(1)fordo
(2)fordo
(3)@side:
(4)
(5)ifthen
(6)fordo
(7)
(8)end
(9)end
(10)@side:
(11)
(12)ifthen
(13)fordo
(14)
(15)end
(16)end
(17)end
(18)end