{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308715,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_36","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:31:10Z","timestamp":1745307070000},"page":"426-431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-secret Steganography Based on Polymorphic Keys"],"prefix":"10.1007","author":[{"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Urszula","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"36_CR1","volume-title":"Practical Cryptography","author":"N Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)"},{"issue":"2","key":"36_CR2","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ijinfomgt.2012.11.008","volume":"33","author":"L Ogiela","year":"2013","unstructured":"Ogiela, L.: Data management in cognitive financial systems. Int. J. Inf. Manag. 33(2), 263\u2013270 (2013). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2012.11.008","journal-title":"Int. J. Inf. Manag."},{"issue":"11","key":"36_CR3","doi-asserted-by":"publisher","first-page":"3331","DOI":"10.1007\/s00500-015-1728-z","volume":"19","author":"MR Ogiela","year":"2015","unstructured":"Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft. Comput. 19(11), 3331\u20133339 (2015). https:\/\/doi.org\/10.1007\/s00500-015-1728-z","journal-title":"Soft. Comput."},{"issue":"4","key":"36_CR4","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1504\/IJES.2020.107642","volume":"12","author":"K Koptyra","year":"2020","unstructured":"Koptyra, K., Ogiela, M.R.: Lightweight and efficient approach for multi-secret steganography. Int. J. Embedded Syst. 12(4), 434\u2013440 (2020). https:\/\/doi.org\/10.1504\/IJES.2020.107642","journal-title":"Int. J. Embedded Syst."},{"issue":"12","key":"36_CR5","doi-asserted-by":"publisher","first-page":"4357","DOI":"10.1007\/s00500-018-3089-x","volume":"23","author":"K Koptyra","year":"2019","unstructured":"Koptyra, K., Ogiela, M.R.: Multiply information coding and hiding using fuzzy vault. Soft. Comput. 23(12), 4357\u20134366 (2019). https:\/\/doi.org\/10.1007\/s00500-018-3089-x","journal-title":"Soft. Comput."},{"issue":"2","key":"36_CR6","first-page":"259","volume":"1","author":"S Tang","year":"2004","unstructured":"Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1(2), 259\u2013262 (2004)","journal-title":"J. Inf. Comput. Sci."},{"issue":"5","key":"36_CR7","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"Shyong Jian Shyu","year":"2006","unstructured":"Shyong Jian Shyu: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39(5), 866\u2013880 (2006)","journal-title":"Pattern Recogn."},{"doi-asserted-by":"publisher","unstructured":"Ogiela, M.R., Ogiela, U.: Linguistic extension for secret sharing (m, n)-threshold schemes. In: 2008 International Conference on Security Technology, Sanya, China, pp. 125\u2013128 (2008). https:\/\/doi.org\/10.1109\/SecTech.2008.15","key":"36_CR8","DOI":"10.1109\/SecTech.2008.15"},{"doi-asserted-by":"publisher","unstructured":"Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. In: \u015al\u0119zak, D., Kim, Th., Fang, W.C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol. 58, pp. 35\u201342. Springer, Cham (2009). https:\/\/doi.org\/10.1007\/978-3-642-10847-1_5","key":"36_CR9","DOI":"10.1007\/978-3-642-10847-1_5"},{"key":"36_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102768","volume":"68","author":"MK Sardar","year":"2020","unstructured":"Sardar, M.K., Adhikari, A.: A new lossless secret color image sharing scheme with small shadow size. J. Vis. Commun. Image Represent. 68, 102768 (2020). https:\/\/doi.org\/10.1016\/j.jvcir.2020.102768","journal-title":"J. Vis. Commun. Image Represent."},{"doi-asserted-by":"crossref","unstructured":"De Santis, A., Masucci, B.: New results on\u00a0distributed secret sharing protocols. LNCS, vol. 13942, pp. 51\u201368 (2023)","key":"36_CR11","DOI":"10.1007\/978-3-031-37586-6_4"},{"doi-asserted-by":"publisher","unstructured":"Ogiela, U., Takizawa, M., Ogiela, L.: Classification of cognitive service management systems in cloud computing. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) BWCCA 2017. LNDE and CT, vol. 12, pp. 309\u2013313. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-69811-3_28","key":"36_CR12","DOI":"10.1007\/978-3-319-69811-3_28"},{"key":"36_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2020.104365","volume":"203","author":"P Perconti","year":"2020","unstructured":"Perconti, P., Plebe, A.: Deep learning and cognitive science. Cognition 203, 104365 (2020). https:\/\/doi.org\/10.1016\/j.cognition.2020.104365","journal-title":"Cognition"},{"volume-title":"The Foundations of Cognitive Science","year":"2001","unstructured":"Branquinho, J. (ed.): The Foundations of Cognitive Science. Clarendon Press, Oxford (2001)","key":"36_CR14"},{"doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Cognitive systems for medical pattern understanding and diagnosis. LNAI, vol. 5177, pp. 394\u2013400. Springer, Heidelberg (2008)","key":"36_CR15","DOI":"10.1007\/978-3-540-85563-7_51"},{"key":"36_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106812","volume":"216","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Liu, F., Li, B., Zhang, L., Zhu, Y., Wang, Z.: Deep discriminative image feature learning for cross-modal semantics understanding. Knowl.-Based Syst. 216, 106812 (2021). https:\/\/doi.org\/10.1016\/j.knosys.2021.106812","journal-title":"Knowl.-Based Syst."},{"key":"36_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/9781009064880","volume-title":"Cognitive Science","author":"JL Berm\u00fadez","year":"2022","unstructured":"Berm\u00fadez, J.L.: Cognitive Science. Cambridge University Press, Cambridge (2022)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:10Z","timestamp":1751567890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_36","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}