{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T00:16:10Z","timestamp":1721088970577},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Songshan Laboratory Pre-research project of China","award":["YYYY022022003"],"award-info":[{"award-number":["YYYY022022003"]}]},{"name":"The Key Scientific Research Project of Colleges and Universities in Henan Province","award":["24A520045"],"award-info":[{"award-number":["24A520045"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10207-024-00873-5","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T12:02:20Z","timestamp":1719921740000},"page":"3029-3042","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-party codebook distribution strategy based on secret sharing"],"prefix":"10.1007","volume":"23","author":[{"given":"Wei","family":"She","sequence":"first","affiliation":[]},{"given":"Haige","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xinpeng","family":"Rong","sequence":"additional","affiliation":[]},{"given":"Tianxiang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"873_CR1","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/s11042-020-09723-7","volume":"80","author":"P Sarosh","year":"2021","unstructured":"Sarosh, P., Parah, S.A., Bhat, G.M.: Utilization of secret sharing technology for secure communication: a state-of-the-art review. Multimed. Tools Appl. 80, 517\u2013541 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09723-7","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"873_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285\u2013287 (2006)","journal-title":"IEEE Signal Process. Lett."},{"key":"873_CR3","doi-asserted-by":"publisher","first-page":"802","DOI":"10.3103\/S0146411616080174","volume":"50","author":"AN Shniperov","year":"2016","unstructured":"Shniperov, A.N., Nikitina, K.: A text steganography method based on Markov chains. Autom. Control Comput. Sci. 50, 802\u2013808 (2016)","journal-title":"Autom. Control Comput. Sci."},{"key":"873_CR4","doi-asserted-by":"publisher","first-page":"102784","DOI":"10.1016\/j.cose.2022.102784","volume":"120","author":"I Makhdoom","year":"2022","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J.: A comprehensive survey of covert communication techniques, limitations and future challenges. Comput. Secur. 120, 102784 (2022)","journal-title":"Comput. Secur."},{"key":"873_CR5","doi-asserted-by":"crossref","unstructured":"Pundkar, S.N., Shekokar, N.: Cloud computing security in multi-clouds using shamir\u2019s secret sharing scheme. In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 392\u2013395 (2016). IEEE","DOI":"10.1109\/ICEEOT.2016.7755427"},{"issue":"2","key":"873_CR6","first-page":"987","volume":"6","author":"S Patil","year":"2013","unstructured":"Patil, S., Rana, N., Patel, D., Hodge, P.: Revisiting proactive secret sharing based on Shamir\u2019s scheme. Int. J. Adv. Eng. Technol. 6(2), 987 (2013)","journal-title":"Int. J. Adv. Eng. Technol."},{"issue":"11","key":"873_CR7","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"873_CR8","doi-asserted-by":"publisher","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop on IEEE Computer Society, pp. 313\u2013313 (1979). https:\/\/doi.org\/10.1109\/AFIPS.1979.98","DOI":"10.1109\/AFIPS.1979.98"},{"key":"873_CR9","doi-asserted-by":"publisher","unstructured":"Bagherzandi, A., Jarecki, S., Saxena, N., Lu, Y.: Password-protected secret sharing. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 433\u2013444 (2011). https:\/\/doi.org\/10.1145\/2046707.2046758","DOI":"10.1145\/2046707.2046758"},{"key":"873_CR10","doi-asserted-by":"publisher","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H., Xu, J.: Toppss: cost-minimal password-protected secret sharing based on threshold OPRF. In: Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, Proceedings 15, pp. 39\u201358 (2017). https:\/\/doi.org\/10.1007\/978-3-319-61204-1_3 . Springer","DOI":"10.1007\/978-3-319-61204-1_3"},{"issue":"6","key":"873_CR11","doi-asserted-by":"publisher","first-page":"307","DOI":"10.11896\/jsjkx.220600069","volume":"50","author":"YM Xiao Jian","year":"2023","unstructured":"Xiao Jian, Y.M.: Multi-factor blockchain private key protection scheme based on secret sharing. Comput. Sci. 50(6), 307\u2013319 (2023). https:\/\/doi.org\/10.11896\/jsjkx.220600069","journal-title":"Comput. Sci."},{"issue":"1","key":"873_CR12","doi-asserted-by":"publisher","first-page":"51","DOI":"10.14188\/j.1671-8836.2021.0308","volume":"69","author":"XJM Qingshu","year":"2023","unstructured":"Qingshu, X.J.M.: Multi-answer protected secret sharing protocol. J. Wuhan Univ. Nat. Sci. Ed. 69(1), 51\u201359 (2023). https:\/\/doi.org\/10.14188\/j.1671-8836.2021.0308","journal-title":"J. Wuhan Univ. Nat. Sci. Ed."},{"key":"873_CR13","doi-asserted-by":"publisher","unstructured":"Aldosary, S., Howells, G.: A robust multimodal biometric security system using the polynomial curve technique within shamir\u2019s secret sharing algorithm. In: 2012 Third International Conference on Emerging Security Technologies, pp. 66\u201369 (2012). https:\/\/doi.org\/10.1109\/EST.2012.9 . IEEE","DOI":"10.1109\/EST.2012.9"},{"key":"873_CR14","doi-asserted-by":"publisher","unstructured":"Baodong, Q., Congzheng, C., Junji, H., Dong, Z.: Multi-keyword searchable encryption scheme based on verifiable secret sharing. Netinfo Secur. 23(5), 32\u201340 (2023). https:\/\/doi.org\/10.3969\/j.issn.1671-1122.2023.05.004","DOI":"10.3969\/j.issn.1671-1122.2023.05.004"},{"issue":"3","key":"873_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3969\/j.issn.1671-1122.2023.03.006","volume":"23","author":"Z Xuewang","year":"2023","unstructured":"Xuewang, Z., Hao, Z., Yaning, Y., Jiali, F.: Privacy protection scheme of consortium blockchain based on group signature and homomorphic encryption. Netinfo Secur. 23(3), 56\u201361 (2023). https:\/\/doi.org\/10.3969\/j.issn.1671-1122.2023.03.006","journal-title":"Netinfo Secur."},{"issue":"10","key":"873_CR16","doi-asserted-by":"publisher","first-page":"121","DOI":"10.11959\/j.issn.1000-436x.2022194","volume":"43","author":"W She","year":"2022","unstructured":"She, W., Rong, X., Liu, W., Tian, Z.: Generative blockchain-based covert communication model based on Markov chain. J. Commun. 43(10), 121\u2013132 (2022). https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2022194","journal-title":"J. Commun."},{"issue":"19","key":"873_CR17","doi-asserted-by":"publisher","first-page":"74","DOI":"10.3981\/j.issn.1000-7857.2021.19.009","volume":"39","author":"L Qi","year":"2021","unstructured":"Qi, L., Hanchao, Y., Jiancheng, C., Hu, H.: Research progress and trend of big-data based biometrics. Sci. Technol. Rev. 39(19), 74\u201382 (2021). https:\/\/doi.org\/10.3981\/j.issn.1000-7857.2021.19.009","journal-title":"Sci. Technol. Rev."},{"key":"873_CR18","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1016\/j.measen.2022.100575","volume":"24","author":"P Archana","year":"2022","unstructured":"Archana, P., Divyabharathi, P., Balaji, S., Kumareshan, N., Veeramanikandan, P., Naitik, S., Rafi, S.M., Nandankar, P.V., Manikandan, G.: Face recognition based vehicle starter using machine learning. Measur. Sens. 24, 575\u2013581 (2022). https:\/\/doi.org\/10.1016\/j.measen.2022.100575","journal-title":"Measur. Sens."},{"key":"873_CR19","first-page":"1988","volume":"27","author":"Y Sun","year":"2014","unstructured":"Sun, Y., Chen, Y., Wang, X., Tang, X.: Deep learning face representation by joint identification-verification. Adv. Neural Inf. Process. Syst. 27, 1988\u20131996 (2014)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"873_CR20","unstructured":"lihualing, h. wangzhi.: Research on face recognition based on image features and face pose. Sci. Technol. Eng. 18(31), 195\u2013199 (2018)"},{"issue":"1","key":"873_CR21","first-page":"1744","volume":"29","author":"QZD Sun\u00a0Dong-Mei","year":"2001","unstructured":"Sun\u00a0Dong-Mei, Q.Z.D.: A survey of the emerging biometric technology. Acta Electron. Sin. 29(1), 1744\u20131748 (2001)","journal-title":"Acta Electron. Sin."},{"issue":"2","key":"873_CR22","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TPAMI.2013.112","volume":"36","author":"Z Lei","year":"2013","unstructured":"Lei, Z., Pietikinen, M., Li, S.Z.: Learning discriminant face descriptor. IEEE Trans. Pattern Anal. Mach. Intell. 36(2), 289\u2013302 (2013). https:\/\/doi.org\/10.1109\/TPAMI.2013.112","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00873-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00873-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00873-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T03:21:39Z","timestamp":1721013699000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00873-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["873"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00873-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,2]]},"assertion":[{"value":"2 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no Conflict of interest with anybody or any institution regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}