{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:37:07Z","timestamp":1767339427739},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T00:00:00Z","timestamp":1668729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s00530-022-00999-3","type":"journal-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T03:02:53Z","timestamp":1668740573000},"page":"831-845","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework"],"prefix":"10.1007","volume":"29","author":[{"given":"Wenying","family":"Wen","sequence":"first","affiliation":[]},{"given":"Yunpeng","family":"Jian","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Baolin","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,18]]},"reference":[{"issue":"2","key":"999_CR1","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1007\/s10278-019-00310-3","volume":"33","author":"MP Mcbee","year":"2020","unstructured":"Mcbee, M.P., Wilcox, C.: Blockchain technology: principles and applications in medical imaging. J. Digit. Imaging 33(2), 726\u2013734 (2020)","journal-title":"J. Digit. Imaging"},{"issue":"1","key":"999_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10278-014-9714-z","volume":"28","author":"SG Langer","year":"2015","unstructured":"Langer, S.G., Tellis, W., Canr, C., Daly, M., Erickson, B.: The RSNA image sharing network. J. Digit. Imaging 28(1), 53\u201361 (2015)","journal-title":"J. Digit. Imaging"},{"issue":"4","key":"999_CR3","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1177\/1460458218769699","volume":"25","author":"V Patel","year":"2018","unstructured":"Patel, V.: A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform. J. 25(4), 1398\u20131411 (2018)","journal-title":"Health Inform. J."},{"issue":"08","key":"999_CR4","first-page":"204","volume":"41","author":"S Niu","year":"2020","unstructured":"Niu, S., Liu, W., Chen, L., Wang, C., Du, X.: Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain. J. Commun. 41(08), 204\u2013214 (2020)","journal-title":"J. Commun."},{"issue":"15","key":"999_CR5","first-page":"1","volume":"11","author":"SM Xu","year":"2021","unstructured":"Xu, S.M., Ning, J.T., Li, Y.J., et al.: A secure EMR sharing system with tamper resistance and expressive access control. IEEE Trans. Dependable Secur. Comput. 11(15), 1 (2021)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"11","key":"999_CR6","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"999_CR7","doi-asserted-by":"crossref","unstructured":"Blakley, G. R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge. IEEE Computer Society, pp. 313\u2013313 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"5","key":"999_CR8","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C-C Thien","year":"2002","unstructured":"Thien, C.-C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765\u2013770 (2002)","journal-title":"Comput. Graph."},{"issue":"12","key":"999_CR9","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.ins.2021.03.029","volume":"562","author":"X Yan","year":"2021","unstructured":"Yan, X., Li, J., Pan, Z., Zhong, X., Yang, G.: Multiparty verification in image secret sharing. Inf. Sci. 562(12), 475\u2013490 (2021)","journal-title":"Inf. Sci."},{"issue":"1\u20132","key":"999_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1\u20132), 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"999_CR11","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s00530-020-00665-6","volume":"27","author":"A Sukumar","year":"2021","unstructured":"Sukumar, A., Subramaniyaswamy, V., Ravi, L., Vijayakumar, V., Indragandhi, V.: Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning. Multimedia Syst. 27, 651\u2013666 (2021). https:\/\/doi.org\/10.1007\/s00530-020-00665-6","journal-title":"Multimedia Syst."},{"issue":"3","key":"999_CR12","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/s00521-020-05260-4","volume":"33","author":"J Lu","year":"2021","unstructured":"Lu, J., Zhang, W., Deng, Z., Zhang, S., Chang, Y., Liu, X.: Research on information steganography based on network data stream. Neural Comput. Appl. 33(3), 851\u2013866 (2021)","journal-title":"Neural Comput. Appl."},{"issue":"11","key":"999_CR13","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.image.2019.08.007","volume":"78","author":"X Wu","year":"2019","unstructured":"Wu, X., Yang, C.: Invertible secret image sharing with steganography and authentication for AMBTC compressed images. Signal Process. Image Commun. 78(11), 437\u2013447 (2019)","journal-title":"Signal Process. Image Commun."},{"key":"999_CR14","doi-asserted-by":"publisher","first-page":"2912","DOI":"10.1109\/TIFS.2021.3065794","volume":"16","author":"L Xiong","year":"2021","unstructured":"Xiong, L., Zhong, X., Yang, C., Han, X.: Transform domain-based invertible and lossless secret image sharing with authentication. IEEE Trans. Inf. Forensics Secur. 16, 2912\u20132925 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"999_CR15","doi-asserted-by":"publisher","first-page":"340","DOI":"10.3390\/sym10080340","volume":"10","author":"J Chen","year":"2018","unstructured":"Chen, J., Liu, K., Yan, X., Liu, L., Xuan, Z., Tan, L.: Chinese remainder theorem-based secret image sharing with small-sized shadow images. Symmetry 10(8), 340 (2018)","journal-title":"Symmetry"},{"issue":"9","key":"999_CR16","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.3390\/math8091452","volume":"8","author":"Y Lu","year":"2020","unstructured":"Lu, Y., Sun, Y., Chen, J.R., Zhang, W., Yan, X.: Meaningful secret image sharing scheme with high visual quality based on natural steganography. Mathematics 8(9), 1452 (2020)","journal-title":"Mathematics"},{"key":"999_CR17","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1109\/LSP.2020.3006375","volume":"27","author":"G Chou","year":"2020","unstructured":"Chou, G., Wang, R.: The nested QR code. IEEE Signal Process. Lett. 27, 1230\u20131234 (2020). https:\/\/doi.org\/10.1109\/LSP.2020.3006375","journal-title":"IEEE Signal Process. Lett."},{"key":"999_CR18","doi-asserted-by":"publisher","unstructured":"Yan, X., Lu, Y.: Applying QR code to secure medical management. In: 2018 9th International Conference on Information Technology in Medicine and Education (ITME). IEEE Computer Society, pp. 53\u201356 (2018). https:\/\/doi.org\/10.1109\/ITME.2018.00023","DOI":"10.1109\/ITME.2018.00023"},{"key":"999_CR19","doi-asserted-by":"publisher","unstructured":"Jiang, Y., Lu, Y., Yan, X., Liu, L.: Extended secret image sharing with lossless recovery based on Chinese remainder theorem and quick response code. In: IEEE 3rd international conference on image, vision and computing (ICIVC), pp. 678\u2013683 (2018). https:\/\/doi.org\/10.1109\/ITME.2018.00023","DOI":"10.1109\/ITME.2018.00023"},{"issue":"11","key":"999_CR20","first-page":"102719","volume":"58","author":"P Huang","year":"2021","unstructured":"Huang, P., Chang, C., Li, Y., Liu, Y.: Enhanced ($$n$$, $$n$$)-threshold QR code secret sharing scheme based on error correction mechanism. J. Inf. Secur. Appl. 58(11), 102719 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"10","key":"999_CR21","doi-asserted-by":"publisher","first-page":"7213","DOI":"10.1109\/TII.2020.3044006","volume":"17","author":"L Xiong","year":"2021","unstructured":"Xiong, L., Zhong, X., Liu, W., Xiong, N.: QR-3S: a high payload QR code secret sharing system for industrial internet of things in 6G networks. IEEE Trans. Ind. Inform. 17(10), 7213\u20137222 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"999_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s00779-017-1089-y","volume":"22","author":"P Huang","year":"2018","unstructured":"Huang, P., Chang, C., Li, Y.: Efficient access control system based on aesthetic QR code. Pers. Ubiquitous Comput. 22(1), 81\u201391 (2018)","journal-title":"Pers. Ubiquitous Comput."},{"issue":"2","key":"999_CR23","first-page":"311","volume":"44","author":"T Li","year":"2019","unstructured":"Li, T., Messer, K.D.: To scan or not to scan: the question of consumer behavior and QR codes on food packages. J. Agric. Resour. Econ. 44(2), 311 (2019)","journal-title":"J. Agric. Resour. Econ."},{"issue":"8","key":"999_CR24","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1007\/s11606-020-05674-9","volume":"35","author":"ND Ramalingam","year":"2020","unstructured":"Ramalingam, N.D., Tran, H.N., Gangopadhyay, A.: As simple as taking a picture-how use of QR codes improved evaluation response rates, documentation, and timeliness. J. Gen. Intern. Med. 35(8), 1615\u20131616 (2020)","journal-title":"J. Gen. Intern. Med."},{"issue":"9","key":"999_CR25","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1109\/TMM.2015.2437711","volume":"17","author":"S Lin","year":"2015","unstructured":"Lin, S., Hu, M., Lee, C.H.: Efficient QR code beautification with high quality visual content. IEEE Trans. Multimedia 17(9), 1515\u20131524 (2015)","journal-title":"IEEE Trans. Multimedia"},{"key":"999_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5779","author":"B Xu","year":"2020","unstructured":"Xu, B., Huang, D., Mi, B.: Research on the application of mobile payment security system based on the internet of things. Concurr. Comput. Pract. Exp. (2020). https:\/\/doi.org\/10.1002\/cpe.5779","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"7","key":"999_CR27","first-page":"2092","volume":"29","author":"A Liu","year":"2018","unstructured":"Liu, A., Du, X., Wang, N.: Research progress of blockchain technology and its application in information security. J. Softw. 29(7), 2092\u20132115 (2018)","journal-title":"J. Softw."},{"issue":"1","key":"999_CR28","first-page":"150","volume":"579","author":"A Pp","year":"2021","unstructured":"Pp, A., Lei, P.A., Xi, Z.B., Aj, B.: SolGuard: preventing external call issues in smart contract-based multi-agent robotic systems. Inf. Sci. 579(1), 150\u2013166 (2021)","journal-title":"Inf. Sci."},{"issue":"6","key":"999_CR29","first-page":"166","volume":"546","author":"E Zhang","year":"2021","unstructured":"Zhang, E., Li, M., Du, J., Yiu, S., Jin, G.: Fair hierarchical secret sharing scheme based on smart contract. Inf. Sci. 546(6), 166\u2013176 (2021)","journal-title":"Inf. Sci."},{"issue":"9","key":"999_CR30","doi-asserted-by":"publisher","first-page":"5719","DOI":"10.1007\/s11042-019-08351-0","volume":"79","author":"L Tan","year":"2020","unstructured":"Tan, L., Lu, Y., Yan, X., Liu, L., Zhou, X.: XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multimedia Tools Appl. 79(9), 5719\u20135741 (2020)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"999_CR31","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TII.2015.2514097","volume":"12","author":"PY Lin","year":"2016","unstructured":"Lin, P.Y.: Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans. Ind. Inform. 12(1), 384\u2013392 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"999_CR32","doi-asserted-by":"publisher","unstructured":"Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Australasian Conference on Information Security and Privacy (ACISP), pp. 409\u2013425 (2016). https:\/\/doi.org\/10.1007\/978-3-319-40253-6-25","DOI":"10.1007\/978-3-319-40253-6-25"},{"key":"999_CR33","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s00530-021-00763-z","volume":"27","author":"R Patel","year":"2021","unstructured":"Patel, R., Lad, K., Patel, M.: Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review. Multimedia Syst. 27, 985\u20131024 (2021). https:\/\/doi.org\/10.1007\/s00530-021-00763-z","journal-title":"Multimedia Syst."},{"issue":"24","key":"999_CR34","first-page":"1","volume":"17","author":"X Yan","year":"2021","unstructured":"Yan, X., Liu, L., Li, L.: Robust secret image sharing scheme against noise in shadow images. ACM Trans. Multimedia Comput. Commun. Appl. 17(24), 1\u201322 (2021)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"999_CR35","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.image.2018.05.001","volume":"66","author":"X Wu","year":"2018","unstructured":"Wu, X., Yang, C., Zhuang, Y., Hsu, S.C.: Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process. Image Commun. 66, 42\u201349 (2018). https:\/\/doi.org\/10.1016\/j.image.2018.05.001","journal-title":"Signal Process. Image Commun."},{"issue":"11","key":"999_CR36","first-page":"102452","volume":"51","author":"X Wu","year":"2020","unstructured":"Wu, X., Yang, C., Yang, Y.: A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. J. Inf. Secur. Appl. 51(11), 102452 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"7","key":"999_CR37","doi-asserted-by":"publisher","first-page":"2896","DOI":"10.1109\/TCSVT.2020.3025527","volume":"31","author":"X Yan","year":"2021","unstructured":"Yan, X., Lu, Y., Yang, C.: A common method of share authentication in image secret sharing. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2896\u20132908 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"999_CR38","doi-asserted-by":"publisher","first-page":"3848","DOI":"10.1109\/TIFS.2020.3001735","volume":"15","author":"X Yan","year":"2020","unstructured":"Yan, X., Lu, Y., Liu, L., Lin, T., Xian Song, H.: Reversible image secret sharing. IEEE Trans. Inf. Forensics Secur. 15, 3848\u20133858 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.3001735","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00999-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-022-00999-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00999-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T10:13:36Z","timestamp":1701425616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-022-00999-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,18]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["999"],"URL":"https:\/\/doi.org\/10.1007\/s00530-022-00999-3","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,18]]},"assertion":[{"value":"29 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}