{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:32Z","timestamp":1740149072276,"version":"3.37.3"},"reference-count":23,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T00:00:00Z","timestamp":1472515200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61272374"],"award-info":[{"award-number":["61272374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,11,25]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper proposes a novel secret image sharing scheme, which progressively hides a secret image into multiple different meaningful cover (or host) images by utilizing a magic matrix. The produced shadows are high visual quality, meaningful images that differ from each other. As a result, they are not easy to cause the suspicion by the attackers. Moreover, the secret image in the proposed scheme can be recovered progressively via different numbers of shadows. The more shadows used, the better the quality of the secret image. The experimental results demonstrate the aforementioned advantages of the proposed scheme. Copyright \u00a9 2016 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1589","type":"journal-article","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T07:28:55Z","timestamp":1472542135000},"page":"4075-4088","source":"Crossref","is-referenced-by-count":10,"title":["Progressive secret image sharing scheme using meaningful shadows"],"prefix":"10.1002","volume":"9","author":[{"given":"Zhi\u2010Hui","family":"Wang","sequence":"first","affiliation":[{"name":"School of Software Dalian University of Technology  Dalian China"}]},{"given":"Ya\u2010Feng","family":"Di","sequence":"additional","affiliation":[{"name":"School of Software Dalian University of Technology  Dalian China"}]},{"given":"Jianjun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Hangzhou Dianzi University  Hangzhou China"}]},{"given":"Chin\u2010Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science Feng Chia University  Taichung Taiwan"}]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software Dalian University of Technology  Dalian China"}]}],"member":"311","published-online":{"date-parts":[[2016,8,30]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2224052"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.03.036"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1894-5"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.019"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.10.005"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.031"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19970821"},{"key":"e_1_2_8_9_1","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"Blakley GR","year":"1979","journal-title":"AFIPS Conference Proceedings"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2006.12.012"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00239-5"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.01.002"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00034-1"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.012"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.04.006"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.11.022"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.04.002"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1584356"},{"issue":"1","key":"e_1_2_8_21_1","first-page":"15","article-title":"Mathematics of sudoku I","volume":"39","author":"Felgenhauer B","year":"2006","journal-title":"Mathematical Spectrum"},{"issue":"2","key":"e_1_2_8_22_1","first-page":"54","article-title":"Mathematics of sudoku II","volume":"39","author":"Russell E","year":"2006","journal-title":"Mathematical Spectrum"},{"key":"e_1_2_8_23_1","doi-asserted-by":"crossref","unstructured":"ChangCC ChouYC KieuTD.An information hiding scheme using sudoku. Proceedings of the Third International Conference on Innovative Computing Information and Control Dalian 2008;17\u201322.","DOI":"10.1109\/ICICIC.2008.149"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINC.2009.250"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1589","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T00:08:54Z","timestamp":1693699734000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,30]]},"references-count":23,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2016,11,25]]}},"alternative-id":["10.1002\/sec.1589"],"URL":"https:\/\/doi.org\/10.1002\/sec.1589","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2016,8,30]]}}}