{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:44:12Z","timestamp":1770137052459,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"29-30","license":[{"start":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T00:00:00Z","timestamp":1588723200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T00:00:00Z","timestamp":1588723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602491"],"award-info":[{"award-number":["61602491"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-020-08970-y","type":"journal-article","created":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T19:02:35Z","timestamp":1588791755000},"page":"21345-21360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Weighted visual cryptographic scheme with improved image quality"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6388-1720","authenticated-orcid":false,"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei Qi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Guozheng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,6]]},"reference":[{"key":"8970_CR1","doi-asserted-by":"crossref","unstructured":"Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp 1\u20136","DOI":"10.1109\/NTMS.2016.7792489"},{"key":"8970_CR2","doi-asserted-by":"crossref","unstructured":"Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inf Secur Appl 48:102362","DOI":"10.1016\/j.jisa.2019.102362"},{"key":"8970_CR3","doi-asserted-by":"crossref","unstructured":"Al Sharif S, Al Ali M, Al Reqabi N, Iqbal F, Baker T, Marrington A (2016) Magec: An image searching tool for detecting forged images in forensic investigation. In: 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp 1\u20136","DOI":"10.1109\/NTMS.2016.7792460"},{"key":"8970_CR4","doi-asserted-by":"crossref","unstructured":"Chao HCFTY (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing, pp 69\u201380","DOI":"10.1016\/j.dsp.2017.05.009"},{"key":"8970_CR5","doi-asserted-by":"crossref","unstructured":"Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimedia Tools and Applications","DOI":"10.1007\/s11042-017-5465-4"},{"key":"8970_CR6","unstructured":"El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access"},{"issue":"5","key":"8970_CR7","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TIFS.2014.2384393","volume":"10","author":"M Fuyou","year":"2015","unstructured":"Fuyou M, Yan X, Xingfu W, Badawy M (2015) Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans Inf Forensic Secur 10(5):889\u2013899","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"8970_CR8","doi-asserted-by":"crossref","unstructured":"Gurunathan K, Rajagopalan SP (2019) A stegano - visual cryptography technique for multimedia security. Multimedia Tools and Applications","DOI":"10.1007\/s11042-019-7471-1"},{"key":"8970_CR9","doi-asserted-by":"crossref","unstructured":"Hou YC, Quan ZY, Tsai CF (2015) A privilege-based visual secret sharing model. Academic Press Inc.","DOI":"10.1016\/j.jvcir.2015.10.005"},{"key":"8970_CR10","doi-asserted-by":"crossref","unstructured":"Jia X, Wang D, Nie D, Luo X, Sun JZ (2019) A new threshold changeable secret sharing scheme based on the chinese remainder theorem. Inf Sci 473:13\u201330","DOI":"10.1016\/j.ins.2018.09.024"},{"issue":"7","key":"8970_CR11","doi-asserted-by":"publisher","first-page":"8207","DOI":"10.1007\/s11042-018-6779-6","volume":"78","author":"X Jia","year":"2019","unstructured":"Jia X, Wang D, Chu Q, Chen Z (2019) An efficient xor-based verifiable visual cryptographic scheme. Multimed Tools Appl 78(7):8207\u20138223","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"8970_CR12","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377\u2013379","journal-title":"Opt Lett"},{"key":"8970_CR13","doi-asserted-by":"crossref","unstructured":"Li P, Liu Z, Yang CN (2018) A construction method of (t,k,n)-essential secret image sharing scheme. Signal Process Image Commun 65:210 \u2013 220","DOI":"10.1016\/j.image.2018.04.002"},{"issue":"1","key":"8970_CR14","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/LSP.2017.2777881","volume":"25","author":"Y Li","year":"2018","unstructured":"Li Y, Guo L (2018) Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Process Lett 25(1):140\u2013144","journal-title":"IEEE Signal Process Lett"},{"key":"8970_CR15","doi-asserted-by":"crossref","unstructured":"Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 45:321\u201329","DOI":"10.1016\/j.ins.2018.04.043"},{"issue":"13","key":"8970_CR16","doi-asserted-by":"publisher","first-page":"16461","DOI":"10.1007\/s11042-017-5215-7","volume":"77","author":"X Liu","year":"2018","unstructured":"Liu X, Wang S, Sang J, Zhang W (2018) A novel lossless recovery algorithm for basic matrix-based vss. Multimed Tools Appl 77(13):16461\u201316476","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"8970_CR17","doi-asserted-by":"publisher","first-page":"20673","DOI":"10.1007\/s11042-017-5482-3","volume":"77","author":"X Liu","year":"2018","unstructured":"Liu X, Wang S, Yan X, Zhang W (2018) Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multimed Tools Appl 77(16):20673\u201320696","journal-title":"Multimed Tools Appl"},{"issue":"mbe-16-05-287","key":"8970_CR18","doi-asserted-by":"publisher","first-page":"5750","DOI":"10.3934\/mbe.2019287","volume":"16","author":"F Liu","year":"2019","unstructured":"Liu F, Yan X, Liu L, Lu Y, Tan L (2019) Weighted visual secret sharing with multiple decryptions and lossless recovery. Math Biosci Eng 16(mbe-16-05-287):5750","journal-title":"Math Biosci Eng"},{"key":"8970_CR19","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology-EUROCRYPT\u201994 lecture notes in computer science, workshop on the theory and application of cryptographic techniques. Springer, Perugia, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"8970_CR20","doi-asserted-by":"crossref","unstructured":"Praveen K, Sethumadhavan M (2018) Cheating immune visual cryptographic scheme with reduced pixel expansion. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra D.P (eds) Progress in Advanced Computing and Intelligent Engineering. Springer Singapore, Singapore, pp 257\u2013265","DOI":"10.1007\/978-981-10-6872-0_24"},{"issue":"9","key":"8970_CR21","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1109\/TCSVT.2017.2707923","volume":"28","author":"SJ Shyu","year":"2018","unstructured":"Shyu SJ (2018) Xor-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circ Syst Video Technol 28(9):2397\u20132401","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"8970_CR22","doi-asserted-by":"publisher","first-page":"59278","DOI":"10.1109\/ACCESS.2019.2914515","volume":"7","author":"L Tan","year":"2019","unstructured":"Tan L, Lu Y, Yan X, Liu L, Li L (2019) Weighted secret image sharing for a (k, n) threshold based on the chinese remainder theorem. IEEE Access 7:59278\u201359286","journal-title":"IEEE Access"},{"issue":"3","key":"8970_CR23","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383\u2013396","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"8970_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.4018\/IJDCF.2016070106","volume":"8","author":"G Wang","year":"2016","unstructured":"Wang G, Liu F, Yan WQ (2016) Basic visual cryptography using braille. Int J Digit Crime Forensic 8(3):85\u201393","journal-title":"Int J Digit Crime Forensic"},{"key":"8970_CR25","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.ins.2014.03.033","volume":"278","author":"CN Yang","year":"2014","unstructured":"Yang CN, Wu CC, Wang DS (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141\u2013173","journal-title":"Inf Sci"},{"key":"8970_CR26","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.sigpro.2014.06.011","volume":"105","author":"X Yan","year":"2014","unstructured":"Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389\u2013398","journal-title":"Signal Process"},{"key":"8970_CR27","doi-asserted-by":"crossref","unstructured":"Yan X, Lu Y, Huang H, Liu L, Wan S (2016) Clarity corresponding to contrast in visual cryptography. Social Computing: Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016. Proceedings, Part I, Harbin, pp 249\u2013257","DOI":"10.1007\/978-981-10-2053-7_23"},{"key":"8970_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.jvcir.2016.10.014","volume":"42","author":"CN Yang","year":"2017","unstructured":"Yang CN, Liao JK, Wang DS (2017) New privilege-based visual cryptography with arbitrary privilege levels. J Vis Commun Image Represent 42:121\u2013131","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"8970_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11554-015-0540-4","volume":"14","author":"X Yan","year":"2018","unstructured":"Yan X, Liu X, Yang CN (2018) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14(1):61\u201373","journal-title":"J Real-Time Image Proc"},{"issue":"2","key":"8970_CR30","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1007\/s11042-017-4421-7","volume":"77","author":"X Yan","year":"2018","unstructured":"Yan X, Lu Y (2018) Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77(2):2653\u20132672","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08970-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08970-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08970-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:42:43Z","timestamp":1620261763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08970-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,6]]},"references-count":30,"journal-issue":{"issue":"29-30","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["8970"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08970-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,6]]},"assertion":[{"value":"22 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}