Research Article

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT

Figure 3

(a) Original “Lena” image; (b) of ; (c) of ; (d) original authentication information .
(a)
(b)
(c)
(d)