{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T04:39:17Z","timestamp":1692851957297},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T00:00:00Z","timestamp":1541721600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802097"],"award-info":[{"award-number":["61802097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY16F020019"],"award-info":[{"award-number":["LY16F020019"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-018-1168-y","type":"journal-article","created":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T14:07:46Z","timestamp":1541772466000},"page":"1317-1335","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method"],"prefix":"10.1007","volume":"24","author":[{"given":"Weitong","family":"Hu","sequence":"first","affiliation":[]},{"given":"Ye","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Di","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qiuhua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,9]]},"reference":[{"issue":"12","key":"1168_CR1","doi-asserted-by":"publisher","first-page":"5618","DOI":"10.1109\/TIP.2017.2738561","volume":"26","author":"L Bao","year":"2017","unstructured":"Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless ( k , n ) $(k, n) $ -secret image sharing. IEEE Trans Image Process 26(12):5618\u20135631","journal-title":"IEEE Trans Image Process"},{"key":"1168_CR2","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. In: AFIPS Conference proceedings, pp 313\u2013317","DOI":"10.1109\/MARK.1979.8817296"},{"key":"1168_CR3","doi-asserted-by":"crossref","unstructured":"Chen Y, Chen F, Wu T, Hu W, Xu X (2018) A deep learning model for secure cyber-physical transportation systems. In: IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 1\u20132","DOI":"10.1109\/INFCOMW.2018.8406824"},{"key":"1168_CR4","unstructured":"Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. arXiv: 1709.08025"},{"issue":"15","key":"1168_CR5","doi-asserted-by":"publisher","first-page":"2889","DOI":"10.1016\/j.ins.2010.04.015","volume":"180","author":"Z Eslami","year":"2010","unstructured":"Eslami Z, Ahmadabadi JZ (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inform Sci 180(15):2889\u20132894","journal-title":"Inform Sci"},{"issue":"5","key":"1168_CR6","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.jss.2011.01.002","volume":"84","author":"Z Eslami","year":"2011","unstructured":"Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803\u2013809","journal-title":"J Syst Softw"},{"issue":"1","key":"1168_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.patcog.2009.06.007","volume":"43","author":"Z Eslami","year":"2010","unstructured":"Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397\u2013404","journal-title":"Pattern Recogn"},{"key":"1168_CR8","doi-asserted-by":"crossref","unstructured":"Guo T, Liu F, Wu CK, Yang CN, Wang W, Ren YW (2013) Threshold secret image sharing. In: Information and communications security. Springer, pp 404\u2013412","DOI":"10.1007\/978-3-319-02726-5_29"},{"issue":"11","key":"1168_CR9","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1002\/sec.567","volume":"5","author":"WT Hu","year":"2012","unstructured":"Hu WT, Li MC, Guo C, Ren YZ (2012) Reversible secret image sharing with steganography and dynamic embedding. Secur Commun Netw 5(11):1267\u20131276","journal-title":"Secur Commun Netw"},{"key":"1168_CR10","first-page":"1","volume":"2015","author":"WT Hu","year":"2015","unstructured":"Hu WT, Li MC, Guo C, Yuan LF (2015) A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Math Probl Eng 2015:1\u201311","journal-title":"Math Probl Eng"},{"issue":"2","key":"1168_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forens Secur 11(2):235\u2013246","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"15","key":"1168_CR12","doi-asserted-by":"publisher","first-page":"16369","DOI":"10.1007\/s11042-016-3917-x","volume":"76","author":"A Kanso","year":"2017","unstructured":"Kanso A, Ghebleh M (2017) An efficient (t, n)\u2013threshold secret image sharing scheme. Multimed Tools Appl 76(15):16369\u201316388","journal-title":"Multimed Tools Appl"},{"key":"1168_CR13","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2014) Introduction to modern cryptography. CRC Press","DOI":"10.1201\/b17668"},{"issue":"3","key":"1168_CR14","first-page":"36","volume":"11","author":"PY Lin","year":"2015","unstructured":"Lin PY (2015) Double verification secret sharing mechanism based on adaptive pixel pair matching. ACM Trans Multimed Comput Commun Appl (TOMM) 11(3):36","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"issue":"1","key":"1168_CR15","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.image.2013.10.003","volume":"29","author":"L Liu","year":"2014","unstructured":"Liu L, Wang AH, Chang CC, Li ZH (2014) A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process Image Commun 29(1):128\u2013134","journal-title":"Signal Process Image Commun"},{"key":"1168_CR16","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton"},{"key":"1168_CR17","doi-asserted-by":"crossref","unstructured":"Ott E (2002) Chaos in dynamical systems. Cambridge University Press","DOI":"10.1017\/CBO9780511803260"},{"issue":"11","key":"1168_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"5","key":"1168_CR19","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765\u2013770","journal-title":"Comput Graph"},{"issue":"1-3","key":"1168_CR20","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/0167-2789(90)90185-R","volume":"45","author":"T Toffoli","year":"1990","unstructured":"Toffoli T, Margolus NH (1990) Invertible cellular automata - a review. Physica D: Nonlinear Phenom 45 (1-3):229\u2013253","journal-title":"Physica D: Nonlinear Phenom"},{"issue":"3","key":"1168_CR21","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.patrec.2012.10.017","volume":"34","author":"G Ulutas","year":"2013","unstructured":"Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34(3):283\u2013291","journal-title":"Pattern Recogn Lett"},{"key":"1168_CR22","unstructured":"Voyatzis G, Pitas I (1996) Chaotic mixing of digital images and applications to watermarking. In: Proceedings of European conference on multimedia applications, services and techniques (ECMAST\u201996), pp 687\u2013695"},{"issue":"6","key":"1168_CR23","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"RZ Wang","year":"2006","unstructured":"Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27 (6):551\u2013555","journal-title":"Pattern Recogn Lett"},{"issue":"8","key":"1168_CR24","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1016\/j.jss.2012.02.046","volume":"85","author":"XT Wu","year":"2012","unstructured":"Wu XT, Ou DH, Liang QM, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85(8):1852\u20131863","journal-title":"J Syst Softw"},{"issue":"4","key":"1168_CR25","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1016\/j.jss.2012.11.021","volume":"86","author":"XT Wu","year":"2013","unstructured":"Wu XT, Sun W (2013) Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform. J Syst Softw 86(4):1068\u20131088","journal-title":"J Syst Softw"},{"key":"1168_CR26","unstructured":"Yang CN, Chang WJ, Cai SR, Lin CY (2014) Secret image sharing without keeping permutation key. In: Information and communications technologies (ICT 2014), pp 1\u20137"},{"key":"1168_CR27","doi-asserted-by":"publisher","first-page":"15021","DOI":"10.1109\/ACCESS.2018.2811722","volume":"6","author":"ZL Zhou","year":"2018","unstructured":"Zhou ZL, Yang CN, Cao Y, Sun XM (2018) Secret image sharing based on encrypted pixels. IEEE Access 6:15021\u201315025","journal-title":"IEEE Access"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1168-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1168-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1168-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T00:00:30Z","timestamp":1605398430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1168-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,9]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1168"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1168-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,9]]},"assertion":[{"value":"9 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}