{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T05:59:12Z","timestamp":1721973552522},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:00:00Z","timestamp":1630108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:00:00Z","timestamp":1630108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11277-021-09041-7","type":"journal-article","created":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T11:02:31Z","timestamp":1630148551000},"page":"3085-3103","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Multiple Secret Image Communication Using Visual Cryptography"],"prefix":"10.1007","volume":"122","author":[{"given":"A.","family":"John Blesswin","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3133-0603","authenticated-orcid":false,"given":"G.","family":"Selva Mary","sequence":"additional","affiliation":[]},{"given":"S.","family":"Manoj Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,28]]},"reference":[{"key":"9041_CR1","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A. (1994). Visual cryptography. In Proceedings of the EUROCRYPT, pp 1\u201312.","DOI":"10.1007\/BFb0053419"},{"issue":"12","key":"9041_CR2","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"SJ Shyu","year":"2012","unstructured":"Shyu, S. J., Huang, S. Y., Lee, Y. K., Wang, R. K., & Chen, K. (2012). Sharing multiple secrets in visual cryptography. Pattern Recognition, 40(12), 3633\u20133651.","journal-title":"Pattern Recognition"},{"key":"9041_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"ER Verheul","year":"1997","unstructured":"Verheul, E. R., & Tilborg, H. C. A. (1997). Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography, 11, 179\u2013196.","journal-title":"Designs Codes Cryptography"},{"key":"9041_CR4","doi-asserted-by":"publisher","first-page":"9279","DOI":"10.1007\/s11042-014-2080-5","volume":"74","author":"X Yan","year":"2015","unstructured":"Yan, X., Wang, S., El-Latif, A., & Niu, X. (2015). Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimedia Tools and Applications, 74, 9279\u20139296.","journal-title":"Multimedia Tools and Applications"},{"key":"9041_CR5","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s11042-015-3066-7","volume":"76","author":"S Sridhar","year":"2017","unstructured":"Sridhar, S., Sathishkumar, R., & Sudha, G. (2017). Adaptive halftoned visual cryptography with improved quality and security. Multimedia Tools Application, 76, 815\u2013834.","journal-title":"Multimedia Tools Application"},{"key":"9041_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A. D., & Stinson, D. R. (2001). Extended capabilities for visual cryptography. Theoretical Computer Science, 250, 143\u2013161.","journal-title":"Theoretical Computer Science"},{"key":"9041_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/S0020-0190(00)00108-3","volume":"6","author":"C Blundo","year":"2000","unstructured":"Blundo, C., Santis, A. D., & Naor, M. (2000). Visual cryptography for grey level images. Information Process Letter, 6, 255\u2013259.","journal-title":"Information Process Letter"},{"key":"9041_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","volume":"24","author":"X Wu","year":"2013","unstructured":"Wu, X., & Sun, W. (2013). Random grid-based visual secret sharing with abilities of OR and XOR decryptions. Journal of Visual Communication and Image Representation, 24, 48\u201362.","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"9041_CR9","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.jvcir.2013.03.002","volume":"24","author":"X Wu","year":"2013","unstructured":"Wu, X., Liu, T., & Sun, W. (2013). Improving the visual quality of random grid-based visual secret sharing via error diffusion. Journal of Visual Communication Image Representation, 24, 552\u2013566.","journal-title":"Journal of Visual Communication Image Representation"},{"issue":"4","key":"9041_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1049\/iet-ifs.2016.0126","volume":"11","author":"Y Ren","year":"2016","unstructured":"Ren, Y., Liu, F., Guo, T., Feng, R., & Lin, D. (2016). Cheating prevention visual cryptography scheme using Latin square. IET Information Security, 11(4), 211\u2013219.","journal-title":"IET Information Security"},{"key":"9041_CR11","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0167-8655(02)00259-3","volume":"24","author":"CC Lin","year":"2003","unstructured":"Lin, C. C., & Tsai, W. H. (2003). Visual cryptography for gray- level images by dithering techniques. Pattern Recognition Letters, 24, 349\u2013358.","journal-title":"Pattern Recognition Letters"},{"key":"9041_CR12","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G. R., & Di Crescenzo, G. (2006). Halftone visual cryptography. IEEE Transactions on Image Processing, 15, 2441\u20132453.","journal-title":"IEEE Transactions on Image Processing"},{"key":"9041_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang, Z., & Arce, G. R. (2009). Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics and Security, 4, 383\u2013396.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"9041_CR14","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TIP.2018.2874378","volume":"28","author":"B Yan","year":"2019","unstructured":"Yan, B., Xiang, Y., & Hua, G. (2019). Improving the visual quality of size-invariant visual cryptography for grayscale images: An analysis-by-synthesis approach. IEEE Transactions on Image Processing, 28(2), 896\u2013911.","journal-title":"IEEE Transactions on Image Processing"},{"key":"9041_CR15","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.image.2006.12.012","volume":"22","author":"RZ Wang","year":"2017","unstructured":"Wang, R. Z., & Shyu, S. J. (2017). Scalable secret image sharing. Signal Processing Image Communication, 22, 363\u2013373.","journal-title":"Signal Processing Image Communication"},{"issue":"3","key":"9041_CR16","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1049\/iet-ipr.2017.0759","volume":"12","author":"NC Mhala","year":"2018","unstructured":"Mhala, N. C., Jamal, R., & Pais, A. R. (2018). Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Processing, 12(3), 422\u2013431.","journal-title":"IET Image Processing"},{"key":"9041_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","volume":"77","author":"M Deshmukh","year":"2018","unstructured":"Deshmukh, M., Nain, N., & Ahmed, M. (2018). Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multimedia Tools Application, 77, 89\u2013107.","journal-title":"Multimedia Tools Application"},{"key":"9041_CR18","doi-asserted-by":"publisher","first-page":"17057","DOI":"10.1007\/s11042-019-7535-2","volume":"79","author":"A John Blesswin","year":"2020","unstructured":"John Blesswin, A., Christhuraj, M. R., Sukumaran, R., & Selva Mary, G. (2020). Enhanced semantic visual secret sharing scheme for the secure image communication. Multimedia Tools and Applications, 79, 17057\u201317079.","journal-title":"Multimedia Tools and Applications"},{"key":"9041_CR19","doi-asserted-by":"publisher","first-page":"10363","DOI":"10.1007\/s11042-019-7202-7","volume":"79","author":"G Selva Mary","year":"2020","unstructured":"Selva Mary, G., & Manoj Kumar, S. (2020). Secure grayscale image communication using significant visual cryptography scheme in real time applications. Multimedia Tools and Applications, 79, 10363\u201310382.","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"9041_CR20","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TCSVT.2016.2631404","volume":"28","author":"X Jia","year":"2018","unstructured":"Jia, X., Wang, D., Nie, D., & Zhang, C. (2018). Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology, 28(5), 1056\u20131070.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"9041_CR21","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1016\/j.procs.2016.02.110","volume":"78","author":"HM Mudia","year":"2016","unstructured":"Mudia, H. M., & Chavan, P. V. (2016). Fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme. Procedia Computer Science, 78, 632\u2013639.","journal-title":"Procedia Computer Science"},{"issue":"12","key":"9041_CR22","first-page":"2059","volume":"8","author":"DS Wang","year":"2013","unstructured":"Wang, D. S., Song, T., Dong, L., & Yang, C. N. (2013). Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Transactions, 8(12), 2059\u20132072.","journal-title":"IEEE Transactions"},{"issue":"12","key":"9041_CR23","doi-asserted-by":"publisher","first-page":"125404","DOI":"10.1088\/1361-6501\/ab2faa","volume":"30","author":"G Selva Mary","year":"2019","unstructured":"Selva Mary, G., & Manoj Kumar, S. (2019). A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication. Measurement Science and Technology, 30(12), 125404.","journal-title":"Measurement Science and Technology"},{"key":"9041_CR24","doi-asserted-by":"publisher","first-page":"59567","DOI":"10.1109\/ACCESS.2018.2874527","volume":"6","author":"Z Fu","year":"2018","unstructured":"Fu, Z., Cheng, Y., & Yu, B. (2018). Visual cryptography scheme with meaningful shares based on QR codes. IEEE Access, 6, 59567\u201359574.","journal-title":"IEEE Access"},{"key":"9041_CR25","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1016\/j.jvcir.2014.06.011","volume":"25","author":"CH Lin","year":"2013","unstructured":"Lin, C. H., Chen, T. H., Wu, Y. T., Tsao, K. H., & Lin, K. S. (2013). Multi-factor cheating prevention in visual secret sharing by hybrid codebooks. Journal of Visual Communication and Image Representation, 25, 1543\u20132155.","journal-title":"Journal of Visual Communication and Image Representation"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09041-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09041-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09041-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T12:23:50Z","timestamp":1643631830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09041-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,28]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["9041"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09041-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,28]]},"assertion":[{"value":"16 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors provided their concern to participate in this journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"All authors provided their concern to publish the paper in this journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}]}}