{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:10:56Z","timestamp":1757617856622,"version":"3.44.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04960-z","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T10:52:50Z","timestamp":1745837570000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Visually enhanced multi-secret sharing scheme with arithmetic modulo, DWT, and particle swarm optimization for Meaningful Shares"],"prefix":"10.1007","volume":"28","author":[{"given":"Arjun Singh","family":"Rawat","sequence":"first","affiliation":[]},{"given":"Maroti","family":"Deshmukh","sequence":"additional","affiliation":[]},{"given":"Maheep","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"4960_CR1","series-title":"Workshop on the Theory and Application of of Cryptographic Techniques","volume-title":"Visual Cryptography","author":"M Naor","year":"1994","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Berlin (1994)"},{"issue":"9","key":"4960_CR2","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TIFS.2013.2274955","volume":"8","author":"X Wu","year":"2013","unstructured":"Wu, X., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inform. Forensics Secur. 8(9), 1541\u20131553 (2013)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"4960_CR3","doi-asserted-by":"crossref","unstructured":"Banik, B.G., and Samir K.B.: Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1147\u20131152 (2015)","DOI":"10.1109\/CICN.2015.223"},{"key":"4960_CR4","doi-asserted-by":"crossref","unstructured":"Meryem, B., and Mabtoul S.: A short survey on image zero-watermarking techniques based on visual cryptography. In: 9th International Symposium on Signal, Image, Video and Communications (ISIVC), pp. 157\u2013162 (2018)","DOI":"10.1109\/ISIVC.2018.8709240"},{"key":"4960_CR5","first-page":"82","volume":"9","author":"D Zhang","year":"2021","unstructured":"Zhang, D., Zhaoquan, G.: A high-quality authenticatable visual secret sharing scheme using SGX. Wirel. Commun. Mobile Comput. 9, 82 (2021)","journal-title":"Wirel. Commun. Mobile Comput."},{"key":"4960_CR6","doi-asserted-by":"crossref","unstructured":"Pan, J.-S., et al.: Novel visual secret sharing scheme for the QR code with meaningful shares. In: Security and Communication Networks, vol. 2022 (2022)","DOI":"10.1155\/2022\/4927239"},{"key":"4960_CR7","doi-asserted-by":"crossref","unstructured":"Maruthi, R., Anusha, P., Bhuvaneswari, K.: An effective payload management $$(2, 3)$$ scheme for visual secret sharing over remote sensing images. In: 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), pp. 1\u20136, IEEE (2022)","DOI":"10.1109\/ICEEICT53079.2022.9768538"},{"issue":"20","key":"4960_CR8","doi-asserted-by":"publisher","first-page":"27041","DOI":"10.1007\/s11042-018-5903-y","volume":"77","author":"A Alif Siddiqua Begum","year":"2018","unstructured":"Alif Siddiqua Begum, A., Nirmala, S.: Secure visual cryptography for medical image using modified cuckoo search. Multimedia Tools Appl. 77(20), 27041\u201327060 (2018)","journal-title":"Multimedia Tools Appl."},{"key":"4960_CR9","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1007\/s11277-023-10315-5","volume":"130","author":"P Dinesh","year":"2023","unstructured":"Dinesh, P., et al.: Single secret sharing scheme using Chinese remainder theorem, modified Shamir\u2019s scheme and XOR operation. Wirel. Personal Commun. 130, 957\u2013985 (2023)","journal-title":"Wirel. Personal Commun."},{"key":"4960_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-023-05396-9","volume":"79","author":"AS Rawat","year":"2023","unstructured":"Rawat, A.S., Deshmukh, M., Singh, M.: Natural share-based lightweight (n, n) single secret image sharing scheme using LSB stuffing for medical images. J. Supercomput. 79, 1\u201330 (2023)","journal-title":"J. Supercomput."},{"key":"4960_CR11","first-page":"935","volume":"3","author":"MS Raval","year":"2003","unstructured":"Raval, M.S., Rege, P.P.: Discrete wavelet transform based multiple watermarking scheme. Conf. Converg. Technol. Asia-Pacific Reg. 3, 935\u2013938 (2003)","journal-title":"Conf. Converg. Technol. Asia-Pacific Reg."},{"issue":"7","key":"4960_CR12","doi-asserted-by":"publisher","first-page":"8024","DOI":"10.1016\/j.eswa.2010.12.129","volume":"38","author":"YR Wang","year":"2011","unstructured":"Wang, Y.R., Lin, W.H., Yang, L.: An intelligent watermarking method based on particle swarm optimization. Expert Syst. Appl. 38(7), 8024\u20138029 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"4960_CR13","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377\u2013379 (1987)","journal-title":"Opt. Lett."},{"issue":"10","key":"4960_CR14","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"W Daoshun","year":"2007","unstructured":"Daoshun, W., et al.: Two secret sharing schemes based on Boolean operations. Pattern Recogn. 40(10), 2776\u20132785 (2007)","journal-title":"Pattern Recogn."},{"key":"4960_CR15","doi-asserted-by":"crossref","unstructured":"Deshmukh, M., Neeta, N., and Mushtaq, A.: An (n, n)-multi secret image sharing scheme using boolean XOR and modular arithmetic. IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 690\u2013697 (2016)","DOI":"10.1109\/AINA.2016.56"},{"key":"4960_CR16","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1016\/j.procs.2016.06.034","volume":"89","author":"M Rajput","year":"2016","unstructured":"Rajput, M., Deshmukh, M.: Secure $$(n, n+ 1)$$-multi secret image sharing scheme using additive modulo. Proc. Comput. Sci. 89, 677\u2013683 (2016)","journal-title":"Proc. Comput. Sci."},{"key":"4960_CR17","doi-asserted-by":"crossref","unstructured":"Deshmukh, M., Neeta, N., and Mushtaq, A.: A novel approach of an (n, n) multi-secret image sharing scheme using additive modulo. In: Proceedings of International Conference on Computer Vision and Image Processing, pp. 149\u2013158 (2017)","DOI":"10.1007\/978-981-10-2104-6_14"},{"issue":"1","key":"4960_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","volume":"77","author":"M Deshmukh","year":"2018","unstructured":"Deshmukh, M., Nain, N., Ahmed, M.: Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multimedia Tools Appl. 77(1), 89\u2013107 (2018)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"4960_CR19","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1007\/s10115-018-1268-9","volume":"60","author":"M Deshmukh","year":"2019","unstructured":"Deshmukh, M., Nain, N., Ahmed, M.: Secret sharing scheme based on binary trees and Boolean operation. Knowl. Inform. Syst. 60(3), 1377\u20131396 (2019)","journal-title":"Knowl. Inform. Syst."},{"key":"4960_CR20","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.jvcir.2017.09.013","volume":"49","author":"M Deshmukh","year":"2017","unstructured":"Deshmukh, M., Nain, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese Remainder Theorem. J. Visual Commun. Image Repres. 49, 291\u2013302 (2017)","journal-title":"J. Visual Commun. Image Repres."},{"key":"4960_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-14609-5","volume":"82","author":"AS Rawat","year":"2023","unstructured":"Rawat, A.S., Maroti, D., Maheep, S.: A novel multi secret image sharing scheme for different dimension secrets. Multimedia Tools Appl. 82, 1\u201337 (2023)","journal-title":"Multimedia Tools Appl."},{"key":"4960_CR22","doi-asserted-by":"crossref","unstructured":"Malonia, M., and Surendra K.A.: Digital image watermarking using discrete wavelet transform and arithmetic progression technique. In: 2016 IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1\u20136 (2016)","DOI":"10.1109\/SCEECS.2016.7509352"},{"key":"4960_CR23","doi-asserted-by":"crossref","unstructured":"Latha, S. Bhargavi, D. Venkata Reddy, and Damodaram, A.: An image watermarking scheme using threshold based secret sharing. In: IEEE 7th International Advance Computing Conference (IACC), pp. 619\u2013623 (2017)","DOI":"10.1109\/IACC.2017.0131"},{"issue":"5","key":"4960_CR24","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1007\/s12652-018-1161-0","volume":"11","author":"K Shankar","year":"2020","unstructured":"Shankar, K., et al.: Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J. Ambient Intell. Hum. Comput. 11(5), 1821\u20131833 (2020)","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"4","key":"4960_CR25","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s13735-018-0161-3","volume":"8","author":"C Oinam Bidyapati","year":"2019","unstructured":"Oinam Bidyapati, C., Neelima, A.: A survey paper on secret image sharing schemes. Int. J. Multimedia Inform. Retr. 8(4), 195\u2013215 (2019)","journal-title":"Int. J. Multimedia Inform. Retr."},{"issue":"2","key":"4960_CR26","doi-asserted-by":"publisher","first-page":"2931","DOI":"10.1007\/s12652-020-02450-9","volume":"12","author":"K Fares","year":"2021","unstructured":"Fares, K., et al.: A DWT based watermarking approach for medical image protection. J. Ambient Intell. Hum. Comput. 12(2), 2931\u20132938 (2021)","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"4960_CR27","doi-asserted-by":"publisher","first-page":"102403","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane, F., et al.: DCT & DWT based watermarking scheme for medical information security. Biomed. Signal Process. Control 66, 102403 (2021)","journal-title":"Biomed. Signal Process. Control"},{"issue":"12","key":"4960_CR28","doi-asserted-by":"publisher","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","volume":"78","author":"AK Abdulrahman","year":"2019","unstructured":"Abdulrahman, A.K., Ozturk, S.: A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimedia Tools Appl. 78(12), 17027\u201317049 (2019)","journal-title":"Multimedia Tools Appl."},{"issue":"43","key":"4960_CR29","first-page":"32881","volume":"79","author":"G Kaiser J","year":"2020","unstructured":"Kaiser J, G., et al.: DWT based color image watermarking: a review. Multimedia Tools Appl. 79(43), 32881\u201332895 (2020)","journal-title":"Multimedia Tools Appl."},{"key":"4960_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, A.: A review on implementation of digital image watermarking techniques using LSB and DWT. In: Information and Communication Technology for Sustainable Development, pp. 595\u2013602 (2020)","DOI":"10.1007\/978-981-13-7166-0_59"},{"key":"4960_CR31","unstructured":"Hashim, A.T., and Loay, E.G.: Secret image sharing based on wavelet transform. In: International Conference on Information Technology in Signal and Image Processing, pp. 324\u2013332 (2013)"},{"issue":"1","key":"4960_CR32","first-page":"012159","volume":"1963","author":"GS Mahdi","year":"2021","unstructured":"Mahdi, G.S., Yousif, N.A., Shimal, A.F.: Medical image watermarking based on secret sharing and integer wavelet transform. J. Phys. 1963(1), 012159 (2021)","journal-title":"J. Phys."},{"key":"4960_CR33","doi-asserted-by":"crossref","unstructured":"Rawat, A.S., Deshmukh, M., Singh, M.: QR Shares based Secret Sharing Scheme using DWT, Random Permutation and Arithmetic Modulo Operation for QR Secret. In: 10th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 772\u2013777, IEEE (2023)","DOI":"10.1109\/SPIN57001.2023.10116359"},{"key":"4960_CR34","doi-asserted-by":"crossref","unstructured":"Rawat, A.S., Deshmukh, M., Singh, M.: Meaningful Shares based Single Secret Sharing Scheme using Chinese Remainder Theorem and XOR Operation. In: 10th International Conference on Signal Processing and Integrated Networks (SPIN). pp. 597\u2013602, IEEE (2023)","DOI":"10.1109\/SPIN57001.2023.10116100"},{"key":"4960_CR35","doi-asserted-by":"crossref","unstructured":"Nandi, S., Santhi, V.: DWT-SVD-based watermarking scheme using optimization technique. Artificial Intelligence and Evolutionary Computations in Engineering Systems: Proceedings of ICAIECES, pp. 69\u201377,Springer (2016)","DOI":"10.1007\/978-81-322-2656-7_7"},{"key":"4960_CR36","doi-asserted-by":"publisher","first-page":"50112","DOI":"10.1109\/ACCESS.2021.3069008","volume":"9","author":"K Gao","year":"2021","unstructured":"Gao, K., Horng, J.-H., Chang, C.-C.: An authenticatable (2, 3) secret sharing scheme using meaningful share images based on hybrid fractal matrix. IEEE Access 9, 50112\u201350125 (2021)","journal-title":"IEEE Access"},{"key":"4960_CR37","doi-asserted-by":"publisher","first-page":"174325","DOI":"10.1109\/ACCESS.2020.3025960","volume":"8","author":"K Gao","year":"2020","unstructured":"Gao, K., Horng, J.-H., Chang, C.-C.: A novel (2, 3) reversible secret image sharing based on fractal matrix. IEEE Access 8, 174325\u2013174341 (2020)","journal-title":"IEEE Access"},{"issue":"7","key":"4960_CR38","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.3390\/sym14071445","volume":"14","author":"C Yi-Hui","year":"2022","unstructured":"Yi-Hui, C., et al.: Verifiable $$(2, n)$$ image secret sharing scheme using sudoku matrix. Symmetry 14(7), 1445 (2022)","journal-title":"Symmetry"},{"key":"4960_CR39","first-page":"22","volume":"2","author":"F Hu","year":"2022","unstructured":"Hu, F., et al.: Threshold meaningful secret image sharing scheme based on QR code. Secur. Commun. Netw. 2, 22 (2022)","journal-title":"Secur. Commun. Netw."},{"issue":"11","key":"4960_CR40","doi-asserted-by":"publisher","first-page":"16097","DOI":"10.1007\/s11042-022-12207-5","volume":"81","author":"J Yue","year":"2022","unstructured":"Yue, J., et al.: Meaningful secret image sharing resist to typical image processing of shadows. Multimedia Tools Appl. 81(11), 16097\u201316115 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"4960_CR41","doi-asserted-by":"crossref","unstructured":"Kapadiya, V.J., Laxmi, S.D., and Yogesh, K.M.: Boolean-based multi secret sharing scheme using meaningful shares. Second International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 840\u2013844 (2018)","DOI":"10.1109\/ICICCT.2018.8473323"},{"issue":"3","key":"4960_CR42","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s11042-016-4012-z","volume":"76","author":"SB Shivani","year":"2017","unstructured":"Shivani, S.B., Suneeta Agarwal, R.: XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multimedia Tools Appl. 76(3), 3851\u20133870 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"4960_CR43","doi-asserted-by":"crossref","unstructured":"Siva Reddy, L., and Munaga, V.N.K.P.: Extended visual cryptography scheme for multi-secret sharing. In: Proceedings of 3rd International Conference on Advanced Computing & Networking and Informatics, pp. 249\u2013257 (2016)","DOI":"10.1007\/978-81-322-2529-4_26"},{"key":"4960_CR44","doi-asserted-by":"crossref","unstructured":"Wu, X., et al.: XOR-based meaningful visual secret sharing by generalized random grids. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 181\u2013190 (2013)","DOI":"10.1145\/2482513.2482515"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04960-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04960-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04960-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T12:26:40Z","timestamp":1757161600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04960-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4960"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04960-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"8 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"282"}}