{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:43Z","timestamp":1740122863187,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T00:00:00Z","timestamp":1540252800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"2017 Teaching and Research Program of Lanzhou University","award":["2017114"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Nos. U1536102","U1536116","U1636219","and 61872289"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Program of Guangxi","award":["16380076"]},{"name":"Plan for Scientic Innovation Talent of Henan Province","award":["2018JR0018"]},{"name":"China Mobile Research Fund Project","award":["MCM20170407"]},{"name":"Key Laboratory of Digital Content Anti-Counterfeiting and Security Forensics of the state Administration of Press, Publication, Radio, Film and Television of the People\u2019s Republic of China"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6779-6","type":"journal-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T11:57:27Z","timestamp":1540295847000},"page":"8207-8223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient XOR-based verifiable visual cryptographic scheme"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7713-3520","authenticated-orcid":false,"given":"Xingxing","family":"Jia","sequence":"first","affiliation":[]},{"given":"Daoshun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qimeng","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Zhenhua","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,23]]},"reference":[{"issue":"3","key":"6779_CR1","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s10623-013-9832-5","volume":"73","author":"A Adhikari","year":"2014","unstructured":"Adhikari A (2014) Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des Codes Crypt 73(3):865\u2013895","journal-title":"Des Codes Crypt"},{"issue":"5","key":"6779_CR2","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1109\/21.44016","volume":"19","author":"B Arazi","year":"1989","unstructured":"Arazi B, Dinstein I, Kafri O (1989) Intuition, perception, and secure communication. IEEE Trans Syst Man Cybern 19(5):1016\u20131020","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"11","key":"6779_CR3","doi-asserted-by":"publisher","first-page":"3097","DOI":"10.1016\/j.patcog.2009.04.012","volume":"42","author":"Chin-Chen Chang","year":"2009","unstructured":"Chang CC, Lin CC, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recogn 42(11):3097\u20133114","journal-title":"Pattern Recognition"},{"issue":"7","key":"6779_CR4","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1109\/TIP.2012.2190082","volume":"21","author":"YC Chen","year":"2012","unstructured":"Chen YC, Horng G, Tsai DS (2012) Comment on \u201ccheating prevention in visual cryptography\u201d. IEEE Trans Image Process: A Publication of the IEEE Signal Processing Society 21(7):3319","journal-title":"IEEE Trans Image Process: A Publication of the IEEE Signal Processing Society"},{"issue":"1","key":"6779_CR5","first-page":"55","volume":"22","author":"YC Chen","year":"2012","unstructured":"Chen YC, Tsai DS, Horng G (2012) A new authentication based cheating prevention scheme in Naor\u2013Shamir\u2019s visual cryptography. J Vis Commun Image Represent 22(1):55\u201363","journal-title":"J Vis Commun Image Represent"},{"key":"6779_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comp J 49:97\u2013107","journal-title":"Comp J"},{"key":"6779_CR7","first-page":"18","volume-title":"Lecture Notes in Computer Science","author":"Paolo D\u2019Arco","year":"2014","unstructured":"D\u2019Arco P, De Prisco R (2014) Secure two-party computation a visual way. In: Padr\u00f3 C (ed) Information theoretic security. Springer International Publishing, Cham, pp 18\u201338"},{"issue":"2","key":"6779_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G Horng","year":"2006","unstructured":"Horng G, Chen T, Tsai DS (2006) Cheating in visual cryptography. Des Codes Crypt 38(2):219\u2013236","journal-title":"Des Codes Crypt"},{"issue":"1","key":"6779_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2007","unstructured":"Hu CM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process A Publication of the IEEE Signal Processing Society 16(1):36\u201345","journal-title":"IEEE Trans Image Process A Publication of the IEEE Signal Processing Society"},{"issue":"10","key":"6779_CR10","first-page":"2172","volume":"82","author":"R Ito","year":"1999","unstructured":"Ito R (1999) Image size in variant visual cryptography. IEICE Trans Fundam 82(10):2172\u20132177","journal-title":"IEICE Trans Fundam"},{"issue":"5","key":"6779_CR11","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TCSVT.2016.2631404","volume":"28","author":"X Jia","year":"2018","unstructured":"Jia X, Wang D, Nie D, Zhang C (2018) Collaborative visual cryptography schemes. IEEE Trans Circ Syst Video Technol 28(5):1056\u20131070","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"C","key":"6779_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2014.12.046","volume":"301","author":"PY Lin","year":"2015","unstructured":"Lin PY, Wang RZ, Chang YJ, Fang WP (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301(C):61\u201374","journal-title":"Inf Sci"},{"issue":"1","key":"6779_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/iet-ifs.2008.0064","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu F, Wu C, Lin X (2011) Cheating immune visual cryptography scheme. IET Inf Secur 5(1):51\u201359","journal-title":"IET Inf Secur"},{"issue":"3","key":"6779_CR14","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"Yining Liu","year":"2019","unstructured":"Liu Y, Guo W, Fan C, Chang L, Cheng C (2018) A practical privacy-preserving data aggregation (3pda) scheme for smart grid. IEEE Trans Ind Inf 1\u20131. https:\/\/doi.org\/10.1109\/TII.2018.2809672","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"21","key":"6779_CR15","doi-asserted-by":"publisher","first-page":"13557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"X Luo","year":"2016","unstructured":"Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557\u201313583","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"6779_CR16","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1049\/iet-ifs.2016.0103","volume":"11","author":"Y Liu","year":"2017","unstructured":"Liu Y, Zhong Q, Chang L, Xia Z, He D, Cheng C (2017) A secure data backup scheme using multi-factor authentication. IET Inf Secur 11(5):250\u2013255","journal-title":"IET Inf Secur"},{"key":"6779_CR17","doi-asserted-by":"publisher","unstructured":"Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set -positive region reduction. IEEE Trans Circuits Syst Video Technol PP(99). https:\/\/doi.org\/10.1109\/TCSVT.2018.2799243","DOI":"10.1109\/TCSVT.2018.2799243"},{"key":"6779_CR18","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology \u2014 CRYPTO '97","author":"Moni Naor","year":"1997","unstructured":"Naor M, Pinkas B (1997) Visual authentication and identification. In: Beth T (ed) Cryptography: proceedings of the workshop on cryptography advances in cryptology - Crypto\u201997, vol 1997. Springer, Berlin, pp 322\u2013336"},{"key":"6779_CR19","first-page":"1","volume-title":"Advances in Cryptology \u2014 EUROCRYPT'94","author":"Moni Naor","year":"1995","unstructured":"Naor M, Shamir A (1994) Visual cryptography. In: Beth T (ed) Cryptography: proceedings of the workshop on cryptography advances in cryptology - EUROCRYPT \u201994, vol 1994. Springer, De Santis, Berlin, pp 1\u201312"},{"issue":"9","key":"6779_CR20","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1093\/comjnl\/bxp068","volume":"53","author":"RD Prisco","year":"2010","unstructured":"Prisco RD, Santis AD (2010) Cheating immune threshold visual secret sharing. Comput J 53(9):1485\u20131496","journal-title":"Comput J"},{"issue":"4","key":"6779_CR21","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1049\/iet-ifs.2016.0126","volume":"11","author":"Y Ren","year":"2017","unstructured":"Ren Y, Liu F, Guo T, Feng R, Lin D (2017) Cheating prevention visual cryptography scheme using latin square. IET Inf Secur 11(4):211\u2013219","journal-title":"IET Inf Secur"},{"issue":"1","key":"6779_CR22","first-page":"1","volume":"85","author":"G Shen","year":"2016","unstructured":"Shen G, Liu F, Fu Z, Yu B (2016) Perfect contrast xor-based visual cryptography schemes via linear algebra. Des Codes Crypt 85(1):1\u201323","journal-title":"Des Codes Crypt"},{"issue":"99","key":"6779_CR23","first-page":"1","volume":"PP","author":"SJ Shyu","year":"2017","unstructured":"Shyu SJ (2017) XOR-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circuits Syst Video Technol PP(99):1\u20131","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"6779_CR24","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","volume":"6","author":"SJ Shyu","year":"2011","unstructured":"Shyu SJ, Chen MC (2011) Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans Inf Forensics Secur 6(3):960\u2013969","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6779_CR25","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.sigpro.2017.06.015","volume":"142","author":"P Singh","year":"2018","unstructured":"Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible xor based visual cryptography with unique meaningful shares. Signal Process 142:301\u2013319","journal-title":"Signal Process"},{"issue":"8","key":"6779_CR26","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"DS Tsai","year":"2007","unstructured":"Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn 40(8):2356\u20132366","journal-title":"Pattern Recogn"},{"issue":"1","key":"6779_CR27","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"37","author":"P Tuyls","year":"2005","unstructured":"Tuyls P, Hollmann HDL, Lint JHV, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Cryptogr 37(1):169\u2013186","journal-title":"Des Codes Cryptogr"},{"issue":"10","key":"6779_CR28","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"issue":"10","key":"6779_CR29","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TIFS.2014.2346014","volume":"9","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) Extended capabilities for XOR-based visual cryptography. IEEE Trans Inf Forensics Secur 9(10):1592\u20131605","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"6779_CR30","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481\u2013494","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"6779_CR31","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TCSVT.2013.2276708","volume":"24","author":"CN Yang","year":"2014","unstructured":"Yang CN, Wang DS (2014) Property analysis of XOR-based visual cryptography. IEEE Trans Circ Syst Video Technol 24(2):189\u2013197","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"6779_CR32","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2013.08.012","volume":"254","author":"HD Yuan","year":"2014","unstructured":"Yuan HD (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197\u2013212","journal-title":"Inf Sci"},{"key":"6779_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6779-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6779-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6779-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T13:45:44Z","timestamp":1662299144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6779-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,23]]},"references-count":33,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6779"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6779-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,10,23]]},"assertion":[{"value":"26 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}