{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:53:39Z","timestamp":1758477219849,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T00:00:00Z","timestamp":1552694400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61602513"],"award-info":[{"award-number":["No.61602513"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Youth Foundation of Zhengzhou Information Science and Technology Institute","award":["No.2016611303"],"award-info":[{"award-number":["No.2016611303"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7455-1","type":"journal-article","created":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T07:02:44Z","timestamp":1552719764000},"page":"21291-21308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A two-level QR code scheme based on polynomial secret sharing"],"prefix":"10.1007","volume":"78","author":[{"given":"Sijia","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhengxin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,16]]},"reference":[{"key":"7455_CR1","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s11036-016-0772-y","volume":"22","author":"C Chen","year":"2016","unstructured":"Chen C (2016) QR code authentication with embedded message authentication code. Mob Netw Appl 22:383\u2013394. https:\/\/doi.org\/10.1007\/s11036-016-0772-y","journal-title":"Mob Netw Appl"},{"issue":"5","key":"7455_CR2","doi-asserted-by":"publisher","first-page":"057004","DOI":"10.1117\/1.3126646","volume":"48","author":"WY Chen","year":"2009","unstructured":"Chen WY, Wang JW (2009) Nested image steganography scheme using qr-barcode technique. Opt Eng 48(5):057004","journal-title":"Opt Eng"},{"unstructured":"Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimedia Tools & Applications, 1\u201321","key":"7455_CR3"},{"doi-asserted-by":"crossref","unstructured":"Chow YW, Susilo W, Yang G, Phillips JG, Pranata I, Barmawi AM (2016) Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing. Australasian Conference on Information Security and Privacy (pp. 409\u2013425). Springer, Cham","key":"7455_CR4","DOI":"10.1007\/978-3-319-40253-6_25"},{"key":"7455_CR5","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/2508363.2508408","volume":"32","author":"HK Chu","year":"2013","unstructured":"Chu HK, Chang CS, Lee RR, Mitra NJ (2013) Halftone QR codes. ACM Trans Graph 32:217. https:\/\/doi.org\/10.1145\/2508363.2508408","journal-title":"ACM Trans Graph"},{"issue":"5","key":"7455_CR6","first-page":"468","volume":"4","author":"JC Chuang","year":"2010","unstructured":"Chuang JC, Hu YC, Ko HJ (2010) A novel secret sharing technique using qr code. International Journal of Image Processing 4(5):468\u2013475","journal-title":"International Journal of Image Processing"},{"doi-asserted-by":"crossref","unstructured":"Chung CH, Chen WY, Tu CM (2009) Image hidden technique using QR-Barcode. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 522\u2013525). IEEE Computer Society","key":"7455_CR7","DOI":"10.1109\/IIH-MSP.2009.119"},{"issue":"6","key":"7455_CR8","doi-asserted-by":"publisher","first-page":"59","DOI":"10.5815\/ijmecs.2012.06.08","volume":"4","author":"S Dey","year":"2012","unstructured":"Dey S, Mondal K, Nath J, Nath A (2012) Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: asa_qr algorithm. International Journal of Modern Education & Computer Science 4(6):59","journal-title":"International Journal of Modern Education & Computer Science"},{"doi-asserted-by":"crossref","unstructured":"Gao M, Sun B (2011) Blind Watermark Algorithm Based on QR Barcode. Foundations of Intelligent Systems. Springer Berlin Heidelberg","key":"7455_CR9","DOI":"10.1007\/978-3-642-25664-6_52"},{"issue":"21","key":"7455_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-016-3250-4","volume":"75","author":"H Hu","year":"2016","unstructured":"Hu H, Shen G, Fu Z et al (2016) General construction for XOR-based visual cryptography and its extended capability. Multimed Tools Appl 75(21):1\u201329","journal-title":"Multimed Tools Appl"},{"unstructured":"Hu H, Shen G, Fu Z et al (2018) Improved Contrast for Threshold Random-grid-based Visual Cryptography. KSII Transactions on Internet & Inf Syst 12(7):3401\u20133420","key":"7455_CR11"},{"doi-asserted-by":"publisher","unstructured":"Hu H, Shen G, Liu Y, et al (2018) Improved Schemes for Visual Secret Sharing Based on Random Grids, https:\/\/doi.org\/10.1007\/s11042-018-6738-2","key":"7455_CR12","DOI":"10.1007\/s11042-018-6738-2"},{"issue":"2","key":"7455_CR13","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/TCE.2011.5955222","volume":"57","author":"HC Huang","year":"2011","unstructured":"Huang HC, Chang FC, Fang WC (2011) Reversible data hiding with histogram-based difference expansion for qr code applications. IEEE Trans Consum Electron 57(2):779\u2013787","journal-title":"IEEE Trans Consum Electron"},{"key":"7455_CR14","first-page":"5","volume":"12","author":"P-C Huang","year":"2018","unstructured":"Huang P-C et al (2018) Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction. KSII Transactions on Internet & Information Systems 12:5","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"7455_CR15","volume-title":"Information technology \u2013 Automatic identification and data capture techniques\u2013 QR Code 2005 bar code symbology specification, International Organization for Standardization","author":"ISO, IEC 18004: 2006","year":"2006","unstructured":"ISO, IEC 18004: 2006 (2006) Information technology \u2013 Automatic identification and data capture techniques\u2013 QR Code 2005 bar code symbology specification, International Organization for Standardization. Geneva, Switzerland"},{"doi-asserted-by":"publisher","unstructured":"Krishna MB, Dugar A (2016) Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel Pers Commun 90:381\u2013398. https:\/\/doi.org\/10.1007\/s11277-016-3374-x","key":"7455_CR16","DOI":"10.1007\/s11277-016-3374-x"},{"issue":"2","key":"7455_CR17","first-page":"29","volume":"2","author":"L Li","year":"2011","unstructured":"Li L, Wang RL, Chang CC (2011) A digital watermark algorithm for. QR Code 2(2):29\u201336","journal-title":"QR Code"},{"issue":"1","key":"7455_CR18","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TII.2015.2514097","volume":"12","author":"PY Lin","year":"2016","unstructured":"Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Transactions on Industrial Informatics 12(1):384\u2013392","journal-title":"IEEE Transactions on Industrial Informatics"},{"doi-asserted-by":"publisher","unstructured":"Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP J Image Video Process. https:\/\/doi.org\/10.1186\/s13640-016-0155-0","key":"7455_CR19","DOI":"10.1186\/s13640-016-0155-0"},{"unstructured":"Liu, Y., Fu, Z., & Wang, Y. (2016). Two-level information management scheme based on visual cryptography and QR code. Application Research of Computers","key":"7455_CR20"},{"unstructured":"Liu L, Lu Y, Yan X, Jiang Y (2016) Polynomial-based Extended Secret Image Sharing Scheme with Reversible Qr-code-like shares. Proceedings of the 14th China Information Hiding Workshop","key":"7455_CR21"},{"unstructured":"Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2016) Action2activity: recognizing complex activities from sensor data","key":"7455_CR22"},{"key":"7455_CR23","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune Teller: Predicting Your Career Path","key":"7455_CR24","DOI":"10.1609\/aaai.v30i1.9969"},{"issue":"5","key":"7455_CR25","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1080\/00288230709510361","volume":"50","author":"JS MingSun","year":"2007","unstructured":"MingSun JS, Zhang S (2007) Research on embedding and extracting methods for digital watermarks applied to qr code images. N Z J Agric Res 50(5):861\u2013867","journal-title":"N Z J Agric Res"},{"key":"7455_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume":"950","author":"M Naor","year":"1995","unstructured":"Naor M, Shamir A (1995) Visual cryptography. Advances in Cryptology \u2014 EUROCRYPT'94 950:1\u201312. https:\/\/doi.org\/10.1007\/BFb0053419","journal-title":"Advances in Cryptology \u2014 EUROCRYPT'94"},{"unstructured":"Rungraungsilp S, Ketcham M, Kosolvijak V, Vongpradhip S (2012) Data hiding method for qr code based on watermark by compare DCT with DFT domain. proc. int. conf. comput. commun. technol. (pp. 144\u2013148)","key":"7455_CR27"},{"key":"7455_CR28","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret? Commun ACM 22:612\u2013613","journal-title":"Commun ACM"},{"key":"7455_CR29","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C-C Thien","year":"2002","unstructured":"Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26:765\u2013770","journal-title":"Comput Graph"},{"key":"7455_CR30","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TIFS.2015.2506546","volume":"11","author":"I Tkachenko","year":"2016","unstructured":"Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-Level QR code for private message sharing and document authentication. IEEE Trans Inf Forensics Secur 11:571\u2013583. https:\/\/doi.org\/10.1109\/TIFS.2015.2506546","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"publisher","unstructured":"Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc. https:\/\/doi.org\/10.1007\/s11554-017-0678-3","key":"7455_CR31","DOI":"10.1007\/s11554-017-0678-3"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7455-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7455-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7455-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T15:32:40Z","timestamp":1694705560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7455-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,16]]},"references-count":31,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7455"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7455-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,3,16]]},"assertion":[{"value":"6 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}