{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:25:14Z","timestamp":1772555114034,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T00:00:00Z","timestamp":1559865600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-019-07807-7","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T15:02:59Z","timestamp":1559919779000},"page":"16219-16243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["An efficient Boolean based multi-secret image sharing scheme"],"prefix":"10.1007","volume":"79","author":[{"given":"Amitava","family":"Nag","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3742-7484","authenticated-orcid":false,"given":"Jyoti Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,7]]},"reference":[{"issue":"14","key":"7807_CR1","doi-asserted-by":"crossref","first-page":"17595","DOI":"10.1007\/s11042-017-4965-6","volume":"77","author":"S Bakshi","year":"2018","unstructured":"Bakshi S, Sa PK, Wang H, Barpanda SS, Majhi B (2018) Fast periocular authentication in handheld devices with reduced phase intensive local pattern. Multimed Tools Appl 77(14):17595\u201317623","journal-title":"Multimed Tools Appl"},{"key":"7807_CR2","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1016\/j.protcy.2012.05.099","volume":"4","author":"T Bhattacharjee","year":"2012","unstructured":"Bhattacharjee T, Singh JP, Nag A (2012) A novel (2, n) secret image sharing scheme. Procedia Technol 4:619\u2013623","journal-title":"Procedia Technol"},{"key":"7807_CR3","doi-asserted-by":"crossref","unstructured":"Blakley GR, et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313\u2013317","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"4","key":"7807_CR4","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo C, De Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptol 12(4):261\u2013289","journal-title":"J Cryptol"},{"key":"7807_CR5","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.sigpro.2013.12.022","volume":"99","author":"C-C Chang","year":"2014","unstructured":"Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on Chinese Remainder Theorem and Lagrange interpolation. Signal Process 99:159\u2013170","journal-title":"Signal Process"},{"key":"7807_CR6","unstructured":"Chanu OB, Neelima A (2018) A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval, pp 1\u201321"},{"issue":"1","key":"7807_CR7","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.sigpro.2010.06.012","volume":"91","author":"T-H Chen","year":"2011","unstructured":"Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90\u201397","journal-title":"Signal Process"},{"issue":"5","key":"7807_CR8","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.1016\/j.dsp.2013.05.014","volume":"23","author":"Y-C Chen","year":"2013","unstructured":"Chen Y-C, Tsai D-S, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digit Signal Process 23(5):1496\u20131504","journal-title":"Digit Signal Process"},{"key":"7807_CR9","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2014.01.001","volume":"92","author":"C-C Chen","year":"2014","unstructured":"Chen C-C, Wu W-J (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107\u2013114","journal-title":"J Syst Softw"},{"issue":"12","key":"7807_CR10","doi-asserted-by":"crossref","first-page":"7113","DOI":"10.1007\/s11042-015-2634-1","volume":"75","author":"C-C Chen","year":"2016","unstructured":"Chen C-C, Wu W-J, Chen J-L (2016) Highly efficient and secure multi-secret image sharing scheme. Multimed Tools Appl 75(12):7113\u20137128","journal-title":"Multimed Tools Appl"},{"key":"7807_CR11","first-page":"45","volume":"33","author":"C-C Chen","year":"2017","unstructured":"Chen C-C, Chen J-L (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45\u201354","journal-title":"J Inf Secur Appl"},{"issue":"14","key":"7807_CR12","doi-asserted-by":"crossref","first-page":"18601","DOI":"10.1007\/s11042-017-5299-0","volume":"77","author":"Q Chen","year":"2018","unstructured":"Chen Q, Zhang G, Yang X, Li S, Li Y, Wang HH (2018) Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimed Tools Appl 77(14):18601\u201318624","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"7807_CR13","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.aml.2010.04.024","volume":"23","author":"A Das","year":"2010","unstructured":"Das A, Adhikari A (2010) An efficient multi-use multi-secret sharing scheme based on hash function. Appl Math Lett 23(9):993\u2013996","journal-title":"Appl Math Lett"},{"issue":"1","key":"7807_CR14","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s11277-018-6032-7","volume":"104","author":"MH Dehkordi","year":"2019","unstructured":"Dehkordi MH, Mashhadi S, Oraei H (2019) A proactive multi stage secret sharing scheme for any given access structure. Wirel Pers Commun 104(1):491\u2013503","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"7807_CR15","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","volume":"77","author":"M Deshmukh","year":"2018","unstructured":"Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimed Tools Appl 77(1):89\u2013107","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7807_CR16","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1007\/s11042-016-3317-2","volume":"76","author":"KM Faraoun","year":"2017","unstructured":"Faraoun KM (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimed Tools Appl 76(5):6247\u20136261","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"7807_CR17","doi-asserted-by":"crossref","first-page":"11903","DOI":"10.1007\/s11042-017-4841-4","volume":"77","author":"M Ghebleh","year":"2018","unstructured":"Ghebleh M, Kanso A (2018) A novel secret image sharing scheme using large primes. Multimed Tools Appl 77(10):11903\u201311923","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"7807_CR18","doi-asserted-by":"crossref","first-page":"11577","DOI":"10.1007\/s11042-015-2885-x","volume":"75","author":"C Guo","year":"2016","unstructured":"Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized Chinese Reminder Theorem. Multimed Tools Appl 75(18):11577\u201311594","journal-title":"Multimed Tools Appl"},{"key":"7807_CR19","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.ins.2016.06.006","volume":"367","author":"L Harn","year":"2016","unstructured":"Harn L, Hsu C, Zhang M, He T, Zhang M (2016) Realizing secret sharing with general access structure. Inf Sci 367:209\u2013220","journal-title":"Inf Sci"},{"issue":"2","key":"7807_CR20","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1007\/s11277-016-3862-z","volume":"95","author":"L Harn","year":"2017","unstructured":"Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Person Commun 95(2):1495\u20131504","journal-title":"Wirel Person Commun"},{"issue":"9","key":"7807_CR21","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1002\/ecjc.4430720906","volume":"72","author":"M Ito","year":"1989","unstructured":"Ito M, Saito A, Nishizeki T (1989) Secret sharing scheme realizing general access structure. Electron Commun Jpn (Part III: Fund Electron Sci) 72(9):56\u201364","journal-title":"Electron Commun Jpn (Part III: Fund Electron Sci)"},{"key":"7807_CR22","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jvcir.2018.10.014","volume":"57","author":"S Kabirirad","year":"2018","unstructured":"Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on Boolean operations. J Vis Commun Image Represent 57:39\u201347","journal-title":"J Vis Commun Image Represent"},{"key":"7807_CR23","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.jvcir.2018.09.018","volume":"56","author":"A Kanso","year":"2018","unstructured":"Kanso A, Ghebleh M (2018) An efficient lossless secret sharing scheme for medical images. J Vis Commun Image Represent 56:245\u2013255","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"7807_CR24","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1007\/s13369-013-0713-z","volume":"39","author":"H Khanzadi","year":"2014","unstructured":"Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arabian J Sci Eng 39(2):1039\u20131047","journal-title":"Arabian J Sci Eng"},{"issue":"12","key":"7807_CR25","doi-asserted-by":"crossref","first-page":"7858","DOI":"10.1016\/j.eswa.2010.04.051","volume":"37","author":"T-L Lin","year":"2010","unstructured":"Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858\u20137869","journal-title":"Expert Syst Appl"},{"issue":"3","key":"7807_CR26","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/LSP.2009.2038113","volume":"17","author":"Y-Y Lin","year":"2010","unstructured":"Lin Y-Y, Wang R-Z (2010) Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 17(3):316\u2013319","journal-title":"IEEE Signal Process Lett"},{"issue":"5","key":"7807_CR27","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1016\/j.asoc.2012.01.016","volume":"12","author":"H Liu","year":"2012","unstructured":"Liu H, Wang X et al (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457\u20131466","journal-title":"Appl Soft Comput"},{"issue":"17","key":"7807_CR28","doi-asserted-by":"crossref","first-page":"7095","DOI":"10.1007\/s11042-014-1953-y","volume":"74","author":"W Liu","year":"2015","unstructured":"Liu W, Wang A, Chang C-C, Li Z, Liu L (2015) A grouped-scalable secret image sharing scheme. Multimed Tools Appl 74(17):7095\u20137109","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7807_CR29","doi-asserted-by":"crossref","first-page":"6017","DOI":"10.1007\/s11042-017-4512-5","volume":"77","author":"Y-N Liu","year":"2018","unstructured":"Liu Y-N, Zhong Q, Xie M, Chen Z-B (2018) A novel multiple-level secret image sharing scheme. Multimed Tools Appl 77(5):6017\u20136031","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"7807_CR30","doi-asserted-by":"crossref","first-page":"1429","DOI":"10.1109\/LSP.2016.2599076","volume":"23","author":"YK Meghrajani","year":"2016","unstructured":"Meghrajani YK, Mazumdar HS (2016) Universal share for multi-secret image sharing scheme based on Boolean operation. IEEE Signal Process Lett 23(10):1429\u20131433","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"7807_CR31","first-page":"98","volume":"14","author":"A Nag","year":"2014","unstructured":"Nag A, Biswas S, Sarkar D, Sarkar PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98\u2013113","journal-title":"Cybern Inf Technol"},{"key":"7807_CR32","unstructured":"Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer, pp 1\u201312"},{"key":"7807_CR33","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604\u2013621","journal-title":"Signal Process"},{"key":"7807_CR34","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jvcir.2015.01.017","volume":"29","author":"D Ou","year":"2015","unstructured":"Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J Vis Commun Image Represent 29:46\u201360","journal-title":"J Vis Commun Image Represent"},{"issue":"11","key":"7807_CR35","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"5","key":"7807_CR36","doi-asserted-by":"crossref","first-page":"6287","DOI":"10.1007\/s11042-017-4536-x","volume":"77","author":"S Shivani","year":"2018","unstructured":"Shivani S (2018a) Multi secret sharing with unexpanded meaningful shares. Multimed Tools Appl 77(5):6287\u20136310","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7807_CR37","doi-asserted-by":"crossref","first-page":"5169","DOI":"10.1007\/s11042-017-4422-6","volume":"77","author":"S Shivani","year":"2018","unstructured":"Shivani S (2018b) VMVC: Verifiable Multi-tone visual cryptography. Multimed Tools Appl 77(5):5169\u20135188","journal-title":"Multimed Tools Appl"},{"key":"7807_CR38","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.sigpro.2017.06.015","volume":"142","author":"P Singh","year":"2018","unstructured":"Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301\u2013319","journal-title":"Signal Process"},{"issue":"5","key":"7807_CR39","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C-C Thien","year":"2002","unstructured":"Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765\u2013770","journal-title":"Comput Graph"},{"issue":"12","key":"7807_CR40","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"C-C Thien","year":"2003","unstructured":"Thien C-C, Lin J-C (2003) An image-sharing method with user-friendly shadow images. IEEE Trans Circ Syst Video Technol 13(12):1161\u20131169","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"6","key":"7807_CR41","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"R-Z Wang","year":"2006","unstructured":"Wang R-Z, Su C-H (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551\u2013555","journal-title":"Pattern Recogn Lett"},{"issue":"10","key":"7807_CR42","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"key":"7807_CR43","unstructured":"Wang K, Zou X, Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference. IEEE, Vol 1, pp 400\u2013405"},{"issue":"3","key":"7807_CR44","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1007\/s11071-015-2234-7","volume":"82","author":"X-Y Wang","year":"2015","unstructured":"Wang X-Y, Zhang Y-Q, Zhao Y-Y (2015) A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. Nonlinear Dyn 82(3):1269\u20131280","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"7807_CR45","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1016\/j.jss.2011.12.041","volume":"85","author":"X Wu","year":"2012","unstructured":"Wu X, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Syst Softw 85(5):1119\u20131134","journal-title":"J Syst Softw"},{"issue":"2","key":"7807_CR46","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan PJ, Agaian S (2011) NPCR And UACI randomness tests for image encryption. J Sel Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Sel Areas Telecommun (JSAT)"},{"issue":"1","key":"7807_CR47","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1186\/1687-6180-2013-49","volume":"2013","author":"K-S Wu","year":"2013","unstructured":"Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49","journal-title":"EURASIP J Adv Signal Process"},{"issue":"2","key":"7807_CR48","doi-asserted-by":"crossref","first-page":"2653","DOI":"10.1007\/s11042-017-4421-7","volume":"77","author":"X Yan","year":"2018","unstructured":"Yan X, Lu Y (2018) Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77(2):2653\u20132672","journal-title":"Multimed Tools Appl"},{"key":"7807_CR49","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jss.2015.01.031","volume":"116","author":"C-N Yang","year":"2016","unstructured":"Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22\u201334","journal-title":"J Syst Softw"},{"issue":"18","key":"7807_CR50","doi-asserted-by":"crossref","first-page":"24073","DOI":"10.1007\/s11042-018-5717-y","volume":"77","author":"J Zarepour-Ahmadabadi","year":"2018","unstructured":"Zarepour-Ahmadabadi J, Shiri-Ahmadabadi M, Latif A (2018) A cellular automata-based multi-stage secret image sharing scheme. Multimed Tools Appl 77(18):24073\u201324096","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07807-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-07807-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07807-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:19:04Z","timestamp":1593623944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-07807-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,7]]},"references-count":50,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7807"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-07807-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,7]]},"assertion":[{"value":"29 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}