{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T01:57:28Z","timestamp":1711591048200},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11042-016-4065-z","type":"journal-article","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T03:51:54Z","timestamp":1477108314000},"page":"21193-21210","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["(t, n) Threshold secret image sharing scheme with adversary structure"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7489-7381","authenticated-orcid":false,"given":"Cheng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Qiongqiong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"4065_CR1","first-page":"213","volume-title":"Generalized secret sharing and monotone functions, Proc. Crypto\u201988, Lecture Notes in Computer Science","author":"J Benaloh","year":"1989","unstructured":"Benaloh J, Leichter J (1989) Generalized secret sharing and monotone functions, Proc. Crypto\u201988, Lecture Notes in Computer Science. Springer, Berlin, pp 213\u2013222"},{"key":"4065_CR2","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. Proc AFIPS Natl Comput Conf 48:313\u2013317","journal-title":"Proc AFIPS Natl Comput Conf"},{"issue":"5","key":"4065_CR3","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/49.223873","volume":"11","author":"CC Chang","year":"1993","unstructured":"Chang CC, Lee HC (1993) New generalized group-oriented cryptoscheme without trusted centers. J IEEE J Sel Areas Commun 11(5):725\u2013729","journal-title":"J IEEE J Sel Areas Commun"},{"issue":"1","key":"4065_CR4","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.patrec.2011.09.030","volume":"33","author":"C Guo","year":"2012","unstructured":"Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing scheme. J Pattern Recognit Lett 33(1):83\u201391","journal-title":"J Pattern Recognit Lett"},{"issue":"12","key":"4065_CR5","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1016\/j.patrec.2012.04.010","volume":"33","author":"C Guo","year":"2012","unstructured":"Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. J Pattern Recognit Lett 33(12):1594\u20131600","journal-title":"J Pattern Recognit Lett"},{"issue":"3","key":"4065_CR6","doi-asserted-by":"crossref","first-page":"2195","DOI":"10.1007\/s11042-013-1510-0","volume":"72","author":"C Guo","year":"2014","unstructured":"Guo C, Chang CC, Qin C (2014) A novel (n, t, n) secret image sharing scheme without a trusted third party. Multimed Tools Appl 72(3):2195\u20132209","journal-title":"Multimed Tools Appl"},{"key":"4065_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2885-x","author":"C Guo","year":"2015","unstructured":"Guo C, Zhang H, Song QQ, Li MC (2015) A multi-threshold secret image sharing scheme based on the generalized Chinese remainder theorem. Multimed Tools Appl. doi:\n10.1007\/s11042-015-2885-x\n\n, Online 20 August 2015","journal-title":"Multimed Tools Appl"},{"key":"4065_CR8","unstructured":"Ito M, Saito A, Nishizeki T, (1987) Secret sharing schemes realizing general access structure. Proc. IEEE Global Telecommunication Conference, IEEE Press, New Jersey, pp. 99\u2013102"},{"issue":"3","key":"4065_CR9","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li XL, Yang B et al (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"13","key":"4065_CR10","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","volume":"31","author":"PY Lin","year":"2010","unstructured":"Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. J Pattern Recognit Lett 31(13):1887\u20131893","journal-title":"J Pattern Recognit Lett"},{"issue":"5","key":"4065_CR11","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1016\/j.patcog.2008.09.014","volume":"42","author":"PY Lin","year":"2009","unstructured":"Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. J Pattern Recognit 42(5):886\u2013895","journal-title":"J Pattern Recognit"},{"issue":"03","key":"4065_CR12","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"CC Lin","year":"2004","unstructured":"Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(03):405\u2013414","journal-title":"J Syst Softw"},{"issue":"3","key":"4065_CR13","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/LSP.2009.2038113","volume":"17","author":"YY Lin","year":"2010","unstructured":"Lin YY, Wang RZ (2010) Scalable secret image sharing with smaller shadow images. J IEEE Signal Process Lett 17(3):316\u2013319","journal-title":"J IEEE Signal Process Lett"},{"issue":"4","key":"4065_CR14","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1007\/BF02944759","volume":"19","author":"J Ma","year":"2004","unstructured":"Ma J, Guo Y (2004) Practical secret sharing scheme realizing generalized adversary structure. J Comput Sci Technol 19(4):564\u2013569","journal-title":"J Comput Sci Technol"},{"issue":"4","key":"4065_CR15","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1587\/transinf.2014EDP7283","volume":"E98-D","author":"TH Ma","year":"2015","unstructured":"Ma TH, Zhou JJ, Tang ML et al (2015) Social network and tag sources based augmenting collaborative recommender system. IEICE Trans Inf Syst E98-D(4):902\u2013910","journal-title":"IEICE Trans Inf Syst"},{"key":"4065_CR16","first-page":"1","volume-title":"Visual cryptography. Advances in cryptology, Proc. Eurocrypt\u201994","author":"M Naor","year":"1995","unstructured":"Naor M, Shamir A (1995) Visual cryptography. Advances in cryptology, Proc. Eurocrypt\u201994. Spring-Verlag, Berlin, pp 1\u201312"},{"issue":"1","key":"4065_CR17","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1360\/crad20060106","volume":"43","author":"L Pang","year":"2006","unstructured":"Pang L, Jiang Z, Yumin AW (2006) Multi-secret sharing scheme based on the general access structure. J Comput Res Dev 43(1):33\u201338","journal-title":"J Comput Res Dev"},{"issue":"5","key":"4065_CR18","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s10207-009-0085-2","volume":"8","author":"H Qin","year":"2009","unstructured":"Qin H, Dai Y, Wang Z (2009) A secret sharing scheme based on (t, n) threshold and adversary structure. J Int J Inf Secur 8(5):379\u2013385","journal-title":"J Int J Inf Secur"},{"issue":"2","key":"4065_CR19","first-page":"317","volume":"16","author":"YJ Ren","year":"2015","unstructured":"Ren YJ, Shen J, Wang J et al (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013323","journal-title":"J Internet Technol"},{"issue":"11","key":"4065_CR20","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"4065_CR21","first-page":"24","volume-title":"On secret multiple image sharing,\u201d proc. The 25th workshop on combinatorial mathematics and computation theory","author":"SJ Shyu","year":"2008","unstructured":"Shyu SJ, Chen YR (2008) On secret multiple image sharing,\u201d proc. The 25th workshop on combinatorial mathematics and computation theory. Chung-Hwa University, Hsinchu, pp 24\u201325"},{"issue":"8","key":"4065_CR22","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/S0140-3664(99)00041-9","volume":"22","author":"KJ Tan","year":"1999","unstructured":"Tan KJ, Zhu HW (1999) General secret sharing scheme. J Comput Commun 22(8):755\u2013757","journal-title":"J Comput Commun"},{"issue":"12","key":"4065_CR23","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"CC Thien","year":"2003","unstructured":"Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. J IEEE Trans Circ Syst Video Technol 13(12):1161\u20131169","journal-title":"J IEEE Trans Circ Syst Video Technol"},{"issue":"6","key":"4065_CR24","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"RZ Wang","year":"2006","unstructured":"Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. J Pattern Recog Lett 27(6):551\u2013555","journal-title":"J Pattern Recog Lett"},{"issue":"2","key":"4065_CR25","first-page":"340","volume":"27","author":"ZH Xia","year":"2015","unstructured":"Xia ZH, Wang XH, Sun XM et al (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8","key":"4065_CR26","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Xiong N (2014) Steganalysis of least significant bit matching using multi-order differences. J Secur Commun Netw 7(8):1283\u20131291","journal-title":"J Secur Commun Netw"},{"issue":"4","key":"4065_CR27","first-page":"1","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. J Multimed Tools Appl 75(4):1\u201316","journal-title":"J Multimed Tools Appl"},{"issue":"4","key":"4065_CR28","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang CN (2004) New visual secret sharing schemes using probabilistic method. J Pattern Recog Lett 25(4):481\u2013494","journal-title":"J Pattern Recog Lett"},{"issue":"7","key":"4065_CR29","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"CN Yang","year":"2007","unstructured":"Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070\u20131076","journal-title":"J Syst Softw"},{"issue":"4","key":"4065_CR30","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.camwa.2011.12.067","volume":"64","author":"D Zhao","year":"2012","unstructured":"Zhao D, Peng H, Wang C, Yang Y (2012) A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. J Comput Math Appl 64(4):611\u2013615","journal-title":"J Comput Math Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4065-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4065-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4065-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T07:54:03Z","timestamp":1505375643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4065-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"references-count":30,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["4065"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4065-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}