Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT
Algorithm 1
Authentication information embedding.
ā
Input: Encrypted shares of the image: and of size ; pseudorandom vectors and of length ; authentication information of size ; embedding intensity indicator .
ā
Output: Encrypted shares of the image with authentication information and .