Research Article

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT

Table 3

Comparison with other algorithms.

Algorithm[30][38][39][40]

Embedding operation1 and domain2LSB Flp. (S)LSB Flp. (S)Add. Emb. (S)LSB Rep. (S)
Embedding time per bit ()36109

Algorithm[41][42][43]Our scheme

Embedding operation1 and domain2Loc. Map (S)Hist. Shft. + Homo. Add. Emb. (S)GWT + Alpha Ble. (T)Add. Emb. (T)
Embedding time per bit ()92011

1LSB Flp.: LSB flipping; Add. Emb.: additive embedding; LSB Rep.: LSB replacement; Loc. Map: location map; Hist. Shft.: histogram shifting; Homo. Add. Emb.: homomorphic additive embedding; GWT: graph wavelets transform; Alpha Ble.: alpha blending. 2“S” represents spatial domain embedding; “T” represents transformed domain embedding.