{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T10:47:49Z","timestamp":1768646869395,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T00:00:00Z","timestamp":1512000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-017-1345-y","type":"journal-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T08:28:16Z","timestamp":1512030496000},"page":"2293-2307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Distortion less secret image sharing scheme for Internet of Things system"],"prefix":"10.1007","volume":"22","author":[{"given":"Li","family":"Li","sequence":"first","affiliation":[]},{"given":"M. Shamim","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"given":"M. F.","family":"Alhamid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,30]]},"reference":[{"issue":"1","key":"1345_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2017.1600374CM","volume":"55","author":"JH Abawajy","year":"2017","unstructured":"Abawajy, J.H., Hassan, M.M.: Federated Internet of things and cloud computing pervasive patient health monitoring system. IEEE Commun. Mag. 55(1), 48\u201353 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"12","key":"1345_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2016.1600398CM","volume":"54","author":"L Hou","year":"2017","unstructured":"Hou, L., Zhao, S., Xiong, X., Zheng, K., Chatzimisios, P., Hossain, M.S., Xiang, W.: Internet of things cloud: architecture and implementation. IEEE Commun. Mag. 54(12), 32\u201339 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"2016","key":"1345_CR3","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"MS Hossain","year":"2016","unstructured":"Hossain, M.S., Muhammad, G.: Cloud-assisted industrial Internet of things (IIoT)-enabled framework for health monitoring. Comput. Netw. 101(2016), 192\u2013202 (2016)","journal-title":"Comput. Netw."},{"key":"1345_CR4","doi-asserted-by":"crossref","unstructured":"Blakley G.R.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313\u2013317, June (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"11","key":"1345_CR5","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1345_CR6","doi-asserted-by":"crossref","unstructured":"Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptography\u2014Eurocrypt\u201994, pp. 1\u201312 (1995)","DOI":"10.1007\/BFb0053419"},{"issue":"6","key":"1345_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/S0020-0190(00)00108-3","volume":"75","author":"C Blude","year":"2000","unstructured":"Blude, C., Santis, A.D., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255\u2013259 (2000)","journal-title":"Inf. Process. Lett."},{"issue":"1\u20133","key":"1345_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0167-8655(02)00259-3","volume":"24","author":"CC Lin","year":"2003","unstructured":"Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recogn. Lett. 24(1\u20133), 349\u2013358 (2003)","journal-title":"Pattern Recogn. Lett."},{"issue":"11","key":"1345_CR9","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1016\/j.ins.2011.01.019","volume":"181","author":"DS Wang","year":"2011","unstructured":"Wang, D.S., Yi, F., Li, X.B.: Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181(11), 2189\u20132208 (2011)","journal-title":"Inf. Sci."},{"issue":"5","key":"1345_CR10","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Gr. 26(5), 765\u2013770 (2002)","journal-title":"Comput. Gr."},{"issue":"12","key":"1345_CR11","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"CC Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161\u20131169 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"1345_CR12","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"RZ Wang","year":"2006","unstructured":"Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27(6), 551\u2013555 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"1345_CR13","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.csi.2007.10.012","volume":"31","author":"R Zhao","year":"2009","unstructured":"Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252\u2013257 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"1345_CR14","doi-asserted-by":"crossref","unstructured":"Li, L., Abd El-Latif, A.A., Wang, C.J., Li, Q., Niu X.M.: A novel secret image sharing scheme based on chaotic system. In: Proceedings of the SPIE, vol. 8334, id. 833412 (2012)","DOI":"10.1117\/12.946098"},{"issue":"8","key":"1345_CR15","first-page":"877","volume":"4","author":"L Li","year":"2012","unstructured":"Li, L., Abd El-Latif, A.A., Shi, Z.F., Niu, X.M.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res. J. Appl. Sci. Eng. Technol. 4(8), 877\u2013883 (2012)","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"issue":"3","key":"1345_CR16","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"CC Lin","year":"2004","unstructured":"Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73(3), 405\u2013414 (2004)","journal-title":"J. Syst. Softw."},{"issue":"7","key":"1345_CR17","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1016\/j.patcog.2004.01.002","volume":"37","author":"YS Wu","year":"2004","unstructured":"Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recogn. 37(7), 1377\u20131385 (2004)","journal-title":"Pattern Recogn."},{"issue":"7","key":"1345_CR18","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"CN Yang","year":"2007","unstructured":"Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070\u20131076 (2007)","journal-title":"J. Syst. Softw."},{"issue":"10","key":"1345_CR19","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41(10), 3130\u20133137 (2008)","journal-title":"Pattern Recogn."},{"issue":"5","key":"1345_CR20","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1016\/j.patcog.2008.09.014","volume":"42","author":"PY Lin","year":"2009","unstructured":"Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret images sharing mechanism using modulus operator. Pattern Recogn. 42(5), 886\u2013895 (2009)","journal-title":"Pattern Recogn."},{"issue":"13","key":"1345_CR21","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","volume":"31","author":"PY Lin","year":"2010","unstructured":"Lin, P.Y., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31(13), 1887\u20131893 (2010)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"1345_CR22","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.patrec.2011.09.030","volume":"33","author":"C Guo","year":"2012","unstructured":"Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33(1), 83\u201391 (2012)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"1345_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.4304\/jcm.5.1.5-12","volume":"5","author":"CC Chang","year":"2010","unstructured":"Chang, C.C., Lin, P.Y., Wang, Z.H., Li, M.C.: A Sudoku-based secret image sharing scheme with reversibility (invited paper). J. Commun. 5(1), 5\u201312 (2010)","journal-title":"J. Commun."},{"issue":"4","key":"1345_CR24","doi-asserted-by":"publisher","first-page":"341","DOI":"10.4304\/jmm.6.4.341-348","volume":"6","author":"C Guo","year":"2011","unstructured":"Guo, C., Wang, Z.H., Chang, C.C., Qin, C.: A secret image sharing scheme with high quality shadows based on exploiting modification direction. J. Multimed. 6(4), 341\u2013348 (2011)","journal-title":"J. Multimed."},{"issue":"11","key":"1345_CR25","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"XP Zhang","year":"2006","unstructured":"Zhang, X.P., Wang, S.Z.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781\u2013783 (2006)","journal-title":"IEEE Commun. Lett."},{"key":"1345_CR26","doi-asserted-by":"crossref","unstructured":"Osborne, J.: Chapter 42-internet of things and cloud computing. In: Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn., pp. 683\u2013698 (2017)","DOI":"10.1002\/9781119173601.ch42"},{"key":"1345_CR27","doi-asserted-by":"crossref","unstructured":"Gilbert, F.: Chapter 43-privacy and security legal issues. In: Geng, H. (ed.) Part VI: Cloud, Legal, Innovation, and Business Models in Internet of Things and Data Analytics Handbook, 1st edn., pp. 699\u2013718 (2017)","DOI":"10.1002\/9781119173601.ch43"},{"key":"1345_CR28","doi-asserted-by":"publisher","unstructured":"Al Alkeem, E., Shehada, D., YeobYeun, C., Jamal Zemerly, M., Hu, J.: New secure healthcare system using cloud of things. Clust. Comput. https:\/\/doi.org\/10.1007\/s10586-017-0872-x (2017)","DOI":"10.1007\/s10586-017-0872-x"},{"key":"1345_CR29","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1007\/s10586-017-0809-4","volume":"20","author":"N Jayapandian","year":"2017","unstructured":"Jayapandian, N., Rahman, A.M.J.M.Z.: Secure and efficient online data storage and sharing over cloudenvironment using probabilistic with homomorphic encryption. Clust. Comput. 20, 1561\u20131573 (2017)","journal-title":"Clust. Comput."},{"key":"1345_CR30","doi-asserted-by":"publisher","unstructured":"Cai, Z., Yan, H., Li, P., Huang, Z., Gao, C.: Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Cluster computing. https:\/\/doi.org\/10.1007\/s10586-017-0796-5 (2017)","DOI":"10.1007\/s10586-017-0796-5"},{"key":"1345_CR31","doi-asserted-by":"publisher","unstructured":"Gopi, R., Rajesh, A.: Securing video cloud storage by ERBAC mechanisms in 5genabled vehicular networks. Clust. Comput. https:\/\/doi.org\/10.1007\/s10586-017-0987-0 (2017)","DOI":"10.1007\/s10586-017-0987-0"},{"key":"1345_CR32","doi-asserted-by":"crossref","unstructured":"Lisowiec, A., Nowakowski, A., Ksiazek, L.: Signal processing in switchgear e-diagnosis network. In: Proceedings of the International Symposium on Power Electronics, Electrical Drives, Automation and Motion, pp. 993\u2013996, 20\u201322 June (2012)","DOI":"10.1109\/SPEEDAM.2012.6264511"},{"issue":"16","key":"1345_CR33","first-page":"1","volume":"3","author":"J Gnanaraj","year":"2013","unstructured":"Gnanaraj, J., Ezra, K., Rajsingh, E.: Smart card based time efficientauthentication scheme for global grid computing. J. Human-Centric Comput. Info. Sci. 3(16), 1\u201317 (2013)","journal-title":"J. Human-Centric Comput. Info. Sci."},{"key":"1345_CR34","unstructured":"Hu, L., Qiu, M., Song, J., Hossain, M.S., Ghoneim, A.: Software defined healthcare networks. IEEE Wirel. Commun. 22(6), 67\u201375 (2015)"},{"issue":"6","key":"1345_CR35","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/JBHI.2013.2263533","volume":"17","author":"G Coatrieux","year":"2013","unstructured":"Coatrieux, G., Huang, H., Shu, H., Luo, L., Roux, C.: Awatermarking-based medical image integrity control system andan image moment signature for tampering characterization. IEEEJ. Biomed. Health Info. 17(6), 1057\u20131067 (2013)","journal-title":"IEEEJ. Biomed. Health Info."},{"key":"1345_CR36","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s10586-014-0392-x","volume":"18","author":"MS Islam","year":"2015","unstructured":"Islam, M.S., Kim, C.-H., Kim, J.-M.: A GPU-based (8, 4) Hamming decoder for secure transmission ofwatermarked medical images. Clust. Comput. 18, 333\u2013341 (2015). https:\/\/doi.org\/10.1007\/s10586-014-0392-x","journal-title":"Clust. Comput."},{"key":"1345_CR37","unstructured":"Niranjana Devi, K., Muthuselvi, R.: Secret sharing of IoThealthcare data using cryptographic algorithm. Int. J. Eng. Res. 5(5): Special 4, 790\u2013991 (2016)"},{"key":"1345_CR38","doi-asserted-by":"publisher","unstructured":"Arafin, M.T., Qu, G.: Secret sharing and multi-user authentication: from visual cryptography to RRAM circuits. In: Proceedings of the 26th edition on Great Lakes Symposium on VLSI (GLSVLSI \u201916). Boston, MA, USA. https:\/\/doi.org\/10.1145\/2902961.2903039 , May 18\u201320 (2016)","DOI":"10.1145\/2902961.2903039"},{"issue":"5","key":"1345_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MWC.2016.7721741","volume":"23","author":"MS Hossain","year":"2016","unstructured":"Hossain, M.S., Muhammad, G., Rahman, S.M.M., Abdul, W., Alelaiwi, A., Alamri, A.: Towards end-to-end biometrics-based security for IoTinfrastructure. IEEE Wirel. Commun. Mag. 23(5), 45\u201351 (2016)","journal-title":"IEEE Wirel. Commun. Mag."},{"key":"1345_CR40","doi-asserted-by":"crossref","unstructured":"Lin, K., Wang, W., Bi, Y., Qiu, M., Hassan, MM.: Human localization based on inertial sensors and fingerprints in the Industrial Internet of Things. Comput. Netw. 101, 113\u2013126","DOI":"10.1016\/j.comnet.2015.11.012"},{"key":"1345_CR41","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. Advances in Computer Science and Information Technology, pp. 175\u2013182. Springer (2010)","DOI":"10.1007\/978-3-642-13577-4_15"},{"key":"1345_CR42","unstructured":"Lin, K., Chen, M., Deng, J., Hassan, M.M., Fortino, G.: Enhanced fingerprinting and trajectory prediction for IoT localization in smart buildings. IEEE Trans. Autom. Sci. Eng. 13(3), 1294\u20131307 (2016)"},{"key":"1345_CR43","unstructured":"Wang, D.: Research of gray-Image steganography based on LSB. Harbin Institute of Technology. Master thesis, December, pp. 16\u201321 (2008)"},{"key":"1345_CR44","doi-asserted-by":"crossref","unstructured":"Li, L., Abd El-Latif, A.A., Yan, X., Wang, S., Niu, X.: A lossless secret image sharing scheme based on steganography. 2012 Second International Conference on Instrumentation Measurement Computer Communication and Control. 8258(1), 1247\u20131250 (2012)","DOI":"10.1109\/IMCCC.2012.293"},{"key":"1345_CR45","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.future.2014.10.019","volume":"55","author":"SMM Rahman","year":"2017","unstructured":"Rahman, S.M.M., Hossain, M.A., Hassan, M.M., Alamri, A., Alghamdi, A., Pathan, M.: Secure privacy vault design for distributed multimedia surveillance system. Future Gener. Comput. Syst. 55, 344\u2013352 (2017)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1345-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1345-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1345-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T04:20:35Z","timestamp":1570422035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1345-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,30]]},"references-count":45,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1345"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1345-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,30]]},"assertion":[{"value":"13 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}