{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:29:51Z","timestamp":1767338991001,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T00:00:00Z","timestamp":1544832000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11042-018-6977-2","type":"journal-article","created":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T06:20:43Z","timestamp":1544854843000},"page":"16283-16310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Security enhancement of shares generation process for multimedia counting-based secret-sharing technique"],"prefix":"10.1007","volume":"78","author":[{"given":"Maimoona","family":"Al-Ghamdi","sequence":"first","affiliation":[]},{"given":"Manal","family":"Al-Ghamdi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan","family":"Gutub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,15]]},"reference":[{"issue":"3","key":"6977_CR1","first-page":"196","volume":"1","author":"W Abu-Marie","year":"2010","unstructured":"Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator. Int J Signal Image Process 1(3):196\u2013204","journal-title":"Int J Signal Image Process"},{"issue":"1","key":"6977_CR2","first-page":"42","volume":"3","author":"E Ahmadoh","year":"2015","unstructured":"Ahmadoh E, Gutub A (June 2015) Utilization of Two Diacritics for Arabic Text Steganography to Enhance Performance. Lect Notes Inf Theory 3(1):42\u201347","journal-title":"Lect Notes Inf Theory"},{"key":"6977_CR3","unstructured":"Alaseri K, Gutub A (2018) \u201cMerging Secret Sharing within Arabic Text Steganography for Practical Retrieval,\u201d International Journal of Research & Development Organisation (IJRDO) - Journal of Computer Science and Engineering, ISSN: 2456\u20131843, Vol. 4, No. 9, Pages: 1\u201318"},{"key":"6977_CR4","doi-asserted-by":"crossref","unstructured":"Al-Juaid N, Gutub A, Khan E (2018) \u201cEnhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography,\u201d Journal of Information Security and Cybercrimes Research (JISCR), Vol. 1, No. 1, Published by Naif Arab University for Security Sciences (NAUSS)","DOI":"10.26735\/16587790.2018.006"},{"key":"6977_CR5","doi-asserted-by":"crossref","unstructured":"Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2018) \u201cIntegrity verification for digital Holy Quran verses using cryptographic hash function and compression,\u201d Journal of King Saud University - Computer and Information Sciences, Published by Elsevier, Published online: 8","DOI":"10.1016\/j.jksuci.2018.02.006"},{"key":"6977_CR6","doi-asserted-by":"publisher","unstructured":"Al-Nofaie S, Fattani M, Gutub A (2016) \u201cMerging Two Steganography Techniques Adjusted to Improve Arabic Text Data Security\u201d, Journal of Computer Science & Computational Mathematics (JCSCM), Vol. 6, No. 3, Pages: 59\u201365, doi: https:\/\/doi.org\/10.20967\/jcscm.2016.03.004 , Published by Science & Knowledge Research Society","DOI":"10.20967\/jcscm.2016.03.004"},{"key":"6977_CR7","doi-asserted-by":"crossref","unstructured":"Al-Otaibi N, Gutub A (2014) \u201c2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers\u201d, Lecture Notes on Information Theory, Vol. 2, No. 2, Pages: 151\u2013157, Engineering and Technology Publishing","DOI":"10.12720\/lnit.2.2.151-157"},{"issue":"2","key":"6977_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth C, Bloom J (1983) A Modular Approach To Key Safeguarding. IEEE Trans Inf Theory 29(2):208\u2013210","journal-title":"IEEE Trans Inf Theory"},{"key":"6977_CR9","unstructured":"Bai L (2006) \u201cA Strong Ramp Secret Sharing Scheme Using Matrix Projection,\u201d International Symposium on A World of Wireless, Mobile and Multimedia Networks (Wowmom\u201906), Buffalo-Niagara Falls, NY, USA"},{"key":"6977_CR10","doi-asserted-by":"crossref","unstructured":"Beimel A (2011) \u201cSecret-Sharing Schemes: A Survey,\u201d Coding and Cryptology, Berlin, Heidelberg, Pages 11\u201346","DOI":"10.1007\/978-3-642-20901-7_2"},{"issue":"4","key":"6977_CR11","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s11277-016-3619-8","volume":"92","author":"VP Binu","year":"2017","unstructured":"Binu VP, Sreekumar A (2017) Secure And Efficient Secret Sharing Scheme With General Access Structures Based On Elliptic Curve and Pairing. Wirel Pers Commun 92(4):1531\u20131543","journal-title":"Wirel Pers Commun"},{"key":"6977_CR12","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) \u201cSafeguarding Cryptographic Keys,\u201d Presented at The Proc. of 1979 AFIPS National Computer Conference","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"1","key":"6977_CR13","first-page":"56","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub A (2010) Pixel Indicator Technique For RGB Image Steganography. J Emerg Technol Web Intell 2(1):56\u201364","journal-title":"J Emerg Technol Web Intell"},{"key":"6977_CR14","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Juaid N (2018) Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority. J Comput Hardware Eng 1(2). https:\/\/doi.org\/10.63019\/jche.v1i2.513 , EnPress Publisher","DOI":"10.63019\/jche.v1i2.513"},{"key":"6977_CR15","unstructured":"Gutub A, Fattani M, (2007) \u201cA Novel Arabic Text Steganography Method Using Letter Points And Extensions\u201d, WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Vienna, Austria, May 25\u201327"},{"key":"6977_CR16","unstructured":"Gutub A, Khan E (2011) \u201cUsing Subthreshold SRAM to Design Low-Power Crypto Hardware,\u201d International Journal of New Computer Architectures and their Applications (IJNCAA), Vol.1, No.2, Pages: 474 483"},{"key":"6977_CR17","unstructured":"Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) \u201cPixel Indicator high capacity Technique for RGB image Based Steganography,\u201d WoSPA 2008 \u2013 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, U.A.E. 18\u201320 March"},{"issue":"1","key":"6977_CR18","first-page":"68","volume":"3","author":"A Gutub","year":"2010","unstructured":"Gutub A, Al-Alwani W, Mahfoodh AB (December 2010) Improved Method Of Arabic Text Steganography Using The Extension \u2018Kashida\u2019 Character. Bahria Univ J Inf Commun Technol 3(1):68\u201372","journal-title":"Bahria Univ J Inf Commun Technol"},{"issue":"2B","key":"6977_CR19","first-page":"125","volume":"38","author":"A Gutub","year":"2011","unstructured":"Gutub A, El-Shafe A-R, Aabed M (2011) Implementation of a pipelined modular multiplier architecture for GF(p) elliptic curve cryptography computation. Kuwait Journal of Science and Engineering (KJSE) 38(2B):125\u2013153","journal-title":"Kuwait Journal of Science and Engineering (KJSE)"},{"key":"6977_CR20","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Juaid N, Khan E (2017) \u201cCounting-Based Secret Sharing Technique For Multimedia Applications,\u201d Multimedia Tools and Applications: An International Journal \u2013 Springer, ISSN: 1380\u20137501, Doi: https:\/\/doi.org\/10.1007\/s11042-017-5293-6 , Published online: 2 November","DOI":"10.1007\/s11042-017-5293-6"},{"issue":"9","key":"6977_CR21","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.ipl.2014.04.006","volume":"114","author":"L Harn","year":"2014","unstructured":"Harn L, Fuyou M (2014) Multilevel Threshold Secret Sharing Based on The Chinese Remainder Theorem. Inf Process Lett 114(9):504\u2013509","journal-title":"Inf Process Lett"},{"key":"6977_CR22","unstructured":"Khan F, Gutub A (2007) \u201cMessage Concealment Techniques Using Image Based Steganography,\u201d The 4th IEEE GCC Conference and Exhibition, Manamah, Bahrain"},{"issue":"1","key":"6977_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1093\/ietfec\/e91-a.1.127","volume":"91","author":"J Kurihara","year":"2008","unstructured":"Kurihara J, Kiyomoto S, Fukushima K, Tanaka T (2008) A Fast (3, N)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations. IEICE Trans Fundam 91(1):127\u2013138","journal-title":"IEICE Trans Fundam"},{"issue":"9","key":"6977_CR24","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1093\/ietfec\/e91-a.9.2365","volume":"E91-A","author":"J Kurihara","year":"2008","unstructured":"Kurihara J, Kiyomoto S, Fukushima K, Tanaka T (2008) On a Fast (K,N)-Threshold Secret Sharing Scheme. IEICE Trans Fundam Electron Commun Comput Sci E91-A(9):2365\u20132378","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"issue":"1","key":"6977_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/BF02828647","volume":"10","author":"P Liao-Jun","year":"2005","unstructured":"Liao-Jun P, Yu-Min W (2005) A Secure And Efficient Multi-Secret Sharing Scheme. Wuhan Univ J Nat Sci 10(1):191\u2013194","journal-title":"Wuhan Univ J Nat Sci"},{"issue":"3","key":"6977_CR26","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.jvcir.2013.01.003","volume":"24","author":"H-C Lin","year":"2013","unstructured":"Lin H-C, Yang C-N, Laih C-S, Lin H-T (2013) Natural Language Letter Based Visual Cryptography Scheme. J Vis Commun Image Represent 24(3):318\u2013331","journal-title":"J Vis Commun Image Represent"},{"key":"6977_CR27","doi-asserted-by":"crossref","unstructured":"Naskar PK, Chaudhuri A, Basu D, Chaudhuri A (2011) \u201cA Novel Image Secret Sharing Scheme,\u201d Second International Conference on Emerging Applications of Information Technology, Pages: 177\u2013180","DOI":"10.1109\/EAIT.2011.43"},{"key":"6977_CR28","unstructured":"Osamu T, Akihiro Y, Kyoko M (2005) \u201cSecret Sharing Scheme Using Natural Language Text,\u201d Journal of The National Institute of Information and Communications Technology, Vol. 52"},{"key":"6977_CR29","doi-asserted-by":"crossref","unstructured":"Parvez MT, Gutub A (2008) \u201cRGB Intensity Based Variable-Bits Image Steganography\u201d, APSCC 2008 \u2013 Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, 9\u201312 December","DOI":"10.1109\/APSCC.2008.105"},{"issue":"1B","key":"6977_CR30","first-page":"127","volume":"38","author":"MT Parvez","year":"2011","unstructured":"Parvez MT, Gutub A (June 2011) Vibrant Color Image Steganography using Channel Differences and Secret Data Distribution. Kuwait J Sci Eng 38(1B):127\u2013142","journal-title":"Kuwait J Sci Eng"},{"key":"6977_CR31","doi-asserted-by":"crossref","unstructured":"Raphel RK, Ilyas HM, Panicker JR (2015) \u201cMultiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme,\u201d Algorithms and Architectures for Parallel Processing, Pages 476\u2013486","DOI":"10.1007\/978-3-319-27161-3_43"},{"issue":"11","key":"6977_CR32","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How To Share A Secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"6977_CR33","doi-asserted-by":"crossref","unstructured":"Shima K, Doi H (2016) \u201c({1,3},N) Hierarchical Secret Sharing Scheme Based on XOR Operations For a Small Number of Indispensable Participants,\u201d 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan","DOI":"10.1109\/AsiaJCIS.2016.11"},{"issue":"4","key":"6977_CR34","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"DR Stinson","year":"1992","unstructured":"Stinson DR (1992) An Explication of Secret Sharing Schemes. Des Codes Crypt 2(4):357\u2013390","journal-title":"Des Codes Crypt"},{"key":"6977_CR35","unstructured":"Tentu AN, Rao AA (2014) \u201cEfficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme,\u201d Cryptography and Security Systems, 100\u2013109"},{"key":"6977_CR36","volume-title":"33rd Annual IEEE International Computer Software and Applications Conference, Pages","author":"K Wang","year":"2009","unstructured":"Wang K, Zou X, Sui Y (July 2009) A Multiple Secret Sharing Scheme Based On Matrix Projection. In: 33rd Annual IEEE International Computer Software and Applications Conference, Pages, vol 400\u2013405. Seattle, WA, USA"},{"issue":"10","key":"6977_CR37","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1016\/j.jss.2011.05.008","volume":"84","author":"C-N Yang","year":"2011","unstructured":"Yang C-N, Chu Y-Y (2011) A General (K, N) Scalable Secret Image Sharing Scheme With The Smooth Scalability. J Syst Softw 84(10):1726\u20131733","journal-title":"J Syst Softw"},{"issue":"9","key":"6977_CR38","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1016\/j.optcom.2009.12.077","volume":"283","author":"C-N Yang","year":"2010","unstructured":"Yang C-N, Huang S-M (2010) Constructions and Properties of K Out of N Scalable Secret Image Sharing. Opt Commun 283(9):1750\u20131762","journal-title":"Opt Commun"},{"issue":"2","key":"6977_CR39","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/S0096-3003(03)00355-2","volume":"151","author":"C-C Yang","year":"2004","unstructured":"Yang C-C, Chang T-Y, Hwang M-S (2004) A (T,N) Multi-Secret Sharing Scheme. Appl Math Comput 151(2):483\u2013490","journal-title":"Appl Math Comput"},{"key":"6977_CR40","unstructured":"Yoshihiro F, Minako T, Norikazu H (2005) \u201cA Fast (2,n)-Threshold Scheme and Its Application,\u201d Proc. CSS 2005, Vol. 2, No. 13, Pages: 631\u2013636"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6977-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6977-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6977-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T11:57:19Z","timestamp":1662638239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6977-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,15]]},"references-count":40,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["6977"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6977-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,12,15]]},"assertion":[{"value":"4 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}