{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:51:55Z","timestamp":1773388315301,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T00:00:00Z","timestamp":1567036800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T00:00:00Z","timestamp":1567036800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08077-z","type":"journal-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T08:58:20Z","timestamp":1567069100000},"page":"453-476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix"],"prefix":"10.1007","volume":"79","author":[{"given":"Xiao-Shuang","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Ming-Xing","family":"He","sequence":"additional","affiliation":[]},{"given":"Chia-Chen","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,29]]},"reference":[{"issue":"3&4","key":"8077_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313\u2013336","journal-title":"IBM Syst J"},{"key":"8077_CR2","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of American Federation of Information Processing Societies National Computer Conference, New York, USA, vol,48, pp 313\u2013317","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"3","key":"8077_CR3","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. In:. Pattern Recogn 37(3):474\u2013496","journal-title":"Pattern Recogn"},{"key":"8077_CR4","doi-asserted-by":"crossref","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. In: Inf. SCI 141(1&2):123\u2013138","DOI":"10.1016\/S0020-0255(01)00194-3"},{"issue":"5","key":"8077_CR5","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1016\/j.patcog.2005.12.011","volume":"39","author":"CC Chang","year":"2006","unstructured":"Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming. In:. Pattern Recogn 39(5):1155\u20131167","journal-title":"Pattern Recogn"},{"key":"8077_CR6","unstructured":"Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. In: Proc. Third Int. Conf. Innovative Computing, Information and Control, Dalian, China, 2008. pp 17\u201322"},{"issue":"10","key":"8077_CR7","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130\u20133137","journal-title":"Pattern Recogn"},{"issue":"1","key":"8077_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.4304\/jcm.5.1.5-12","volume":"5","author":"CC Chang","year":"2010","unstructured":"Chang CC, Lin PY, Wang ZH, Li MC (2010) A sudoku-based secret image sharing scheme with reversibility. In:. J Commun 5(1):5\u201312","journal-title":"J Commun"},{"key":"8077_CR9","doi-asserted-by":"crossref","unstructured":"Chang CC, Liu YJ, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: Proc. Tenth Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP \u201814), Kitakyushu, Japan, 27\u201329, pp 89\u201393","DOI":"10.1109\/IIH-MSP.2014.29"},{"issue":"3","key":"8077_CR10","first-page":"342","volume":"5","author":"CC Chang","year":"2014","unstructured":"Chang CC, Chen YH, Chuang LY (2014) Meaningful shadows for image secret sharing with steganography and authentication techniques. In:. Journal of Information Hiding and Multimedia Signal Processing 5(3):342\u2013352","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"8","key":"8077_CR11","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1049\/iet-ipr.2015.0568","volume":"10","author":"CC Chang","year":"2016","unstructured":"Chang CC, Liu Y, Wu HL (2016) Distortion-free secret image sharing method with two meaningful shadows. In:. IET Image Process 10(8):590\u2013597","journal-title":"IET Image Process"},{"issue":"1","key":"8077_CR12","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2005","unstructured":"Cimato S, Prisco RDE, Santis ADE (2005) Probabilistic visual cryptography schemes. In:. Comput J 49(1):97\u2013107","journal-title":"Comput J"},{"issue":"1","key":"8077_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato S, Prisco RDE, Santis ADE (2006) Probabilistic visual cryptography schemes. In:. Comput J 49(1):97\u2013107","journal-title":"Comput J"},{"issue":"1","key":"8077_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"CT Hsu","year":"1999","unstructured":"Hsu CT, Wu JL (1999) Hidden digital watermarks in images. In:. IEEE Transactions of Image Processing 8(1):58\u201368","journal-title":"IEEE Transactions of Image Processing"},{"issue":"7","key":"8077_CR15","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D Kundur","year":"1999","unstructured":"Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. In:. Proc IEEE 87(7):1167\u20131180","journal-title":"Proc IEEE"},{"key":"8077_CR16","unstructured":"Lin ET, Delp EJ (1999) A review of fragile image watermarks. In: Multimedia and Security Workshop in ACM Multimedia, 99, Orlando"},{"issue":"3","key":"8077_CR17","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"C Lin","year":"2004","unstructured":"Lin C, Tsai W (2004) Secret image sharing with steganography and authentication. In:. The Journal of Systems and Software 73(3):405\u2013414","journal-title":"The Journal of Systems and Software"},{"key":"8077_CR18","unstructured":"Liu YJ, Chang CC (2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. In: Multimedia Tools and Applications 1\u201316"},{"key":"8077_CR19","doi-asserted-by":"crossref","unstructured":"Noar N, Shamir A (1995) Visual cryptography. In: Proceedings of Eurocrypt '94, Perugia. 905, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"issue":"15","key":"8077_CR20","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. In:. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8077_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. In:. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"5","key":"8077_CR22","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"SJ Shyu","year":"2006","unstructured":"Shyu SJ (2006) Efficient visual secret sharing scheme for color images. In:. Pattern Recogn 39(5):866\u2013880","journal-title":"Pattern Recogn"},{"issue":"1","key":"8077_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/45.747238","volume":"18","author":"DR Stinson","year":"1999","unstructured":"Stinson DR (1999) Visual cryptography and threshold schemes. In:. IEEE Potentials 18(1):13\u201316","journal-title":"IEEE Potentials"},{"issue":"12","key":"8077_CR24","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"CC Thien","year":"2003","unstructured":"Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. In:. IEEE Trans on Circuits and Systems for Video Technology 13(12):1161\u20131169","journal-title":"IEEE Trans on Circuits and Systems for Video Technology"},{"issue":"12","key":"8077_CR25","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1016\/S0031-3203(03)00221-8","volume":"36","author":"CC Thien","year":"2003","unstructured":"Thien CC, Lin JC (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. In:. Pattern Recogn 36(12):2875\u20132881","journal-title":"Pattern Recogn"},{"issue":"9","key":"8077_CR26","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TIFS.2013.2274955","volume":"8","author":"XT Wu","year":"2013","unstructured":"Wu XT, Sun W (2013) Generalized random grid and its applications in visual cryptography. In:. IEEE Transactions on Information Forensics and Security 8(9):1541\u20131553","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9&10","key":"8077_CR27","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. In:. Pattern Recognition Lett 24(9&10):1613\u20131626","journal-title":"Pattern Recognition Lett"},{"issue":"4","key":"8077_CR28","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang CN (2004) New visual secret sharing schemes using probabilistic method. In:. Pattern Recogn Lett 25(4):481\u2013494","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"8077_CR29","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"CN Yang","year":"2005","unstructured":"Yang CN, Chen TS (2005) Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. In:. Pattern Recogn 26(2):193\u2013206","journal-title":"Pattern Recogn"},{"issue":"1","key":"8077_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1002\/ima.20096","volume":"17","author":"CN Yang","year":"2007","unstructured":"Yang CN, Yu KH, Lukac R (2007) User-friendly image sharing using polynomials with different primes. In:. Int J Imaging Systems Technol 17(1):40\u201347","journal-title":"Int J Imaging Systems Technol"},{"issue":"7","key":"8077_CR31","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"CN Yang","year":"2007","unstructured":"Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. In:. J Syst Softw 80(7):1070\u20131078","journal-title":"J Syst Softw"},{"issue":"11","key":"8077_CR32","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"XP Zhang","year":"2006","unstructured":"Zhang XP, Wang SZ (2006) Efficient steganographic embedding by exploiting modification direction. In:. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08077-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08077-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08077-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T23:17:30Z","timestamp":1598570250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08077-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,29]]},"references-count":32,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8077"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08077-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,29]]},"assertion":[{"value":"5 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}