{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T08:27:48Z","timestamp":1777537668555,"version":"3.51.4"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T00:00:00Z","timestamp":1445644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11042-015-3011-9","type":"journal-article","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T05:46:23Z","timestamp":1445665583000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Selective scalable secret image sharing with verification"],"prefix":"10.1007","volume":"76","author":[{"given":"Jung-San","family":"Lee","sequence":"first","affiliation":[]},{"given":"You-Ren","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,24]]},"reference":[{"issue":"10","key":"3011_CR1","doi-asserted-by":"crossref","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130\u20133137","journal-title":"Pattern Recogn"},{"key":"3011_CR2","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/TCSVT.2013.2280097","volume":"24","author":"YC Hou","year":"2014","unstructured":"Hou YC, Wei SC, Lin CY (2014) Random-grid-based visual cryptography schemes. IEEE Trans Circuits Syst Video Technol 24:733\u2013744","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3011_CR3","doi-asserted-by":"crossref","unstructured":"Jiang H, Wang J, Yuan Z, Wu Y, Zheng N, Li S (2013) Salient object detection: A discriminative regional feature integration approach. 2013 I.E. Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2083\u20132090","DOI":"10.1109\/CVPR.2013.271"},{"issue":"13","key":"3011_CR4","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","volume":"31","author":"PY Lin","year":"2010","unstructured":"Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887\u20131893","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"3011_CR5","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1049\/iet-ifs.2008.0043","volume":"5","author":"PY Lin","year":"2011","unstructured":"Lin PY, Chang CC (2011) Cheating resistance and reversibility oriented secret sharing mechanism. IET Inf Secur 5(2):81\u201392","journal-title":"IET Inf Secur"},{"key":"3011_CR6","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.ins.2014.07.016","volume":"288","author":"KS Lin","year":"2014","unstructured":"Lin KS, Lin CH, Chen TH (2014) Distortionless visual multi-secret sharing based on random grid. Inf Sci 288:330\u2013346","journal-title":"Inf Sci"},{"issue":"3","key":"3011_CR7","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"CC Lin","year":"2004","unstructured":"Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405\u2013414","journal-title":"J Syst Softw"},{"issue":"1","key":"3011_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00034-005-1123-6","volume":"25","author":"TRN Rao","year":"2006","unstructured":"Rao TRN, Yang CH (2006) Aryabhata remainder theorem: relevance to public-key crypto-algorithms. Circuits Syst Signal Process 25(1):1\u201315","journal-title":"Circuits Syst Signal Process"},{"issue":"11","key":"3011_CR9","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"3011_CR10","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien CC, Lin JC (2002) Secret image sharing. Comp Graph 26:765\u2013770","journal-title":"Comp Graph"},{"issue":"7","key":"3011_CR11","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1016\/j.jvcir.2010.06.001","volume":"21","author":"RZ Wang","year":"2010","unstructured":"Wang RZ, Chien YF, Lin YY (2010) Scalable user-friendly image sharing. J Vis Commun Image Represent 21(7):751\u2013761","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"3011_CR12","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.image.2006.12.012","volume":"22","author":"RZ Wang","year":"2007","unstructured":"Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363\u2013373","journal-title":"Signal Process Image Commun"},{"key":"3011_CR13","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"RZ Wang","year":"2006","unstructured":"Wang RZ, Su CH (2006) Secret image sharing with smaller shadows. Pattern Recogn Lett 27:551\u2013555","journal-title":"Pattern Recogn Lett"},{"key":"3011_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","volume":"24","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image Represent 24:48\u201362","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"3011_CR15","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"CN Yang","year":"2007","unstructured":"Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070\u20131076","journal-title":"J Syst Softw"},{"issue":"10","key":"3011_CR16","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.1016\/j.jss.2011.05.008","volume":"84","author":"CN Yang","year":"2011","unstructured":"Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726\u20131733","journal-title":"J Syst Softw"},{"key":"3011_CR17","doi-asserted-by":"crossref","first-page":"1750","DOI":"10.1016\/j.optcom.2009.12.077","volume":"283","author":"CN Yang","year":"2010","unstructured":"Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283:1750\u20131762","journal-title":"Opt Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3011-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3011-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3011-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3011-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:32:36Z","timestamp":1559345556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3011-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,24]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["3011"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3011-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,24]]}}}