{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T03:28:17Z","timestamp":1720754897848},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103679","type":"journal-article","created":{"date-parts":[[2023,12,24]],"date-time":"2023-12-24T18:30:01Z","timestamp":1703442601000},"page":"103679","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix"],"prefix":"10.1016","volume":"80","author":[{"given":"Yijie","family":"Lin","sequence":"first","affiliation":[]},{"given":"Chia-Chen","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jui\u2010Chuan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin\u2010Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.jisa.2023.103679_bib0001","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognition"},{"issue":"5","key":"10.1016\/j.jisa.2023.103679_bib0002","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","article-title":"LSB matching revisited","volume":"13","author":"Mielikainen","year":"2006","journal-title":"IEEE Signal Processing Letters"},{"issue":"3","key":"10.1016\/j.jisa.2023.103679_bib0003","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","article-title":"Image hiding by optimal LSB substitution and genetic algorithm","volume":"34","author":"Wang","year":"2001","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.jisa.2023.103679_bib0004","series-title":"Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers 6","first-page":"97","article-title":"Improved detection of LSB steganography in grayscale images","author":"Ker","year":"2005"},{"issue":"3","key":"10.1016\/j.jisa.2023.103679_bib0005","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"7","key":"10.1016\/j.jisa.2023.103679_bib0006","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","article-title":"An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism","volume":"23","author":"Qin","year":"2012","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"11","key":"10.1016\/j.jisa.2023.103679_bib0007","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","article-title":"Efficient steganographic embedding by exploiting modification direction","volume":"10","author":"Zhang","year":"2006","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"10.1016\/j.jisa.2023.103679_bib0008","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.camwa.2010.01.006","article-title":"Improved modification direction methods","volume":"60","author":"Kim","year":"2010","journal-title":"Computers & Mathematics with Applications"},{"issue":"1","key":"10.1016\/j.jisa.2023.103679_bib0009","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3390\/sym10010019","article-title":"Efficient information hiding based on theory of numbers","volume":"10","author":"Liu","year":"2018","journal-title":"Symmetry"},{"issue":"8","key":"10.1016\/j.jisa.2023.103679_bib0010","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"8","key":"10.1016\/j.jisa.2023.103679_bib0011","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","article-title":"Reversible watermark using the difference expansion of a generalized integer transform","volume":"13","author":"Alattar","year":"2004","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.jisa.2023.103679_bib0012","series-title":"2008 3rd international conference on innovative computing information and control","first-page":"17","article-title":"An information hiding scheme using Sudoku","author":"Chang","year":"2008"},{"key":"10.1016\/j.jisa.2023.103679_bib0013","series-title":"2008 International Symposium on Information Science and Engineering","first-page":"515","article-title":"A minimal Euclidean distance searching technique for Sudoku steganography","volume":"1","author":"Hong","year":"2008"},{"key":"10.1016\/j.jisa.2023.103679_bib0014","first-page":"1","article-title":"A Sudoku based wet paper hiding scheme","volume":"3","author":"Kieu","year":"2009","journal-title":"Int. J. Smart Home"},{"key":"10.1016\/j.jisa.2023.103679_bib0015","series-title":"2014 tenth international conference on intelligent information hiding and multimedia signal processing","first-page":"89","article-title":"A novel turtle shell based scheme for data hiding","author":"Chang","year":"2014"},{"issue":"2","key":"10.1016\/j.jisa.2023.103679_bib0016","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1049\/iet-ipr.2014.1015","article-title":"High capacity turtle shell-based data hiding","volume":"10","author":"Liu","year":"2016","journal-title":"IET Image Processing"},{"issue":"1","key":"10.1016\/j.jisa.2023.103679_bib0017","first-page":"154","article-title":"Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization","volume":"19","author":"Jin","year":"2017","journal-title":"Int. J. Netw. Secur."},{"key":"10.1016\/j.jisa.2023.103679_bib0018","doi-asserted-by":"crossref","first-page":"12233","DOI":"10.1007\/s11042-016-3624-7","article-title":"Data hiding based on extended turtle shell matrix construction method","volume":"76","author":"Liu","year":"2017","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"10.1016\/j.jisa.2023.103679_bib0019","doi-asserted-by":"crossref","first-page":"47","DOI":"10.3390\/sym10020047","article-title":"Data hiding based on a two-layer turtle shell matrix","volume":"10","author":"Xie","year":"2018","journal-title":"Symmetry"},{"issue":"11","key":"10.1016\/j.jisa.2023.103679_bib0020","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/j.jisa.2023.103679_bib0021","first-page":"204","article-title":"Non-expansion visual secret sharing in reversible style","volume":"9","author":"Fang","year":"2009","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"1","key":"10.1016\/j.jisa.2023.103679_bib0022","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1179\/174313107X214330","article-title":"On generating meaningful shares in visual secret sharing scheme","volume":"56","author":"Tsai","year":"2008","journal-title":"The Imaging Science Journal"},{"issue":"3","key":"10.1016\/j.jisa.2023.103679_bib0023","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","article-title":"Optimum pixel expansions for threshold visual secret sharing schemes","volume":"6","author":"Shyu","year":"2011","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.jisa.2023.103679_bib0024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2020.01.038","article-title":"Secret sharing with secure secret reconstruction","volume":"519","author":"Harn","year":"2020","journal-title":"Information Sciences"},{"key":"10.1016\/j.jisa.2023.103679_bib0025","series-title":"Reversible data hiding scheme using two steganographic images. TENCON 2007-2007 IEEE Region 10 Conference","first-page":"1","author":"Chang","year":"2007"},{"key":"10.1016\/j.jisa.2023.103679_bib0026","series-title":"2009 Third International Conference on Multimedia and Ubiquitous Engineering","first-page":"145","article-title":"Information hiding in dual images with reversibility","author":"Chang","year":"2009"},{"key":"10.1016\/j.jisa.2023.103679_bib0027","doi-asserted-by":"crossref","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","article-title":"Reversible data hiding scheme based on exploiting modification direction with two steganographic images","volume":"74","author":"Qin","year":"2015","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.jisa.2023.103679_bib0028","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","article-title":"Reversible data hiding scheme based on dual stegano-images using orientation combinations","volume":"52","author":"Lee","year":"2013","journal-title":"Telecommunication Systems"},{"issue":"1","key":"10.1016\/j.jisa.2023.103679_bib0029","doi-asserted-by":"crossref","first-page":"5","DOI":"10.4304\/jcm.5.1.5-12","article-title":"A sudoku-based secret image sharing scheme with reversibility","volume":"5","author":"Chang","year":"2010","journal-title":"J. Commun."},{"key":"10.1016\/j.jisa.2023.103679_bib0030","first-page":"3848","article-title":"Reversible image secret sharing","volume":"15","author":"Yan","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.jisa.2023.103679_bib0031","doi-asserted-by":"crossref","first-page":"25295","DOI":"10.1007\/s11042-018-5785-z","article-title":"A turtle shell-based visual secret sharing scheme with reversibility and authentication","volume":"77","author":"Liu","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"10.1016\/j.jisa.2023.103679_bib0032","doi-asserted-by":"crossref","first-page":"50112","DOI":"10.1109\/ACCESS.2021.3069008","article-title":"An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix","volume":"9","author":"Gao","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103679_bib0033","doi-asserted-by":"crossref","first-page":"130405","DOI":"10.1109\/ACCESS.2020.3009410","article-title":"A reversible secret image sharing scheme based on stick insect matrix","volume":"8","author":"Gao","year":"2020","journal-title":"IEEE Access"},{"issue":"11","key":"10.1016\/j.jisa.2023.103679_bib0034","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.3390\/sym13112063","article-title":"A novel (2, 3)-threshold reversible secret image sharing scheme based on optimized crystal-lattice matrix","volume":"13","author":"Lin","year":"2021","journal-title":"Symmetry"},{"issue":"4","key":"10.1016\/j.jisa.2023.103679_bib0035","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.3934\/mbe.2019093","article-title":"Security protection using two different image shadows with authentication","volume":"16","author":"Liu","year":"2019","journal-title":"Math. Biosci. Eng"},{"issue":"13","key":"10.1016\/j.jisa.2023.103679_bib0036","doi-asserted-by":"crossref","first-page":"3802","DOI":"10.3390\/s20133802","article-title":"A maze matrix-based secret image sharing scheme with cheater detection","volume":"20","author":"Chang","year":"2020","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.jisa.2023.103679_bib0037","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.3390\/sym14071445","article-title":"Verifiable (2,n)Image Secret Sharing Scheme Using Sudoku Matrix","volume":"14","author":"Chen","year":"2022","journal-title":"Symmetry"},{"key":"10.1016\/j.jisa.2023.103679_bib0038","series-title":"SHA-256, SHA-384, SHA-512","year":"2000"},{"key":"10.1016\/j.jisa.2023.103679_bib0039","volume":"20","author":"Bas","year":"2017"},{"key":"10.1016\/j.jisa.2023.103679_bib0040","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/s11042-019-08077-z","article-title":"A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix","volume":"79","author":"Li","year":"2020","journal-title":"Multimedia Tools and Applications"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002636?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002636?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T22:57:26Z","timestamp":1709074646000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":40,"alternative-id":["S2214212623002636"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103679","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103679","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103679"}}