{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T19:59:37Z","timestamp":1758398377318,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"43-44","license":[{"start":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T00:00:00Z","timestamp":1598659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T00:00:00Z","timestamp":1598659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602491"],"award-info":[{"award-number":["61602491"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11042-020-09568-0","type":"journal-article","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T11:02:42Z","timestamp":1598698962000},"page":"32693-32710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Penrose tiling for visual secret sharing"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6388-1720","authenticated-orcid":false,"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Wei Qi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Lintao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuliang","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,29]]},"reference":[{"issue":"2","key":"9568_CR1","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth C, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inf Theory 29(2):208\u2013210","journal-title":"IEEE Trans Inf Theory"},{"key":"9568_CR2","doi-asserted-by":"publisher","first-page":"1438","DOI":"10.1016\/j.ijleo.2016.11.152","volume":"130","author":"A Belazi","year":"2017","unstructured":"Belazi A, El-Latif AAA (2017) A simple yet efficient s-box method based on chaotic sine map. Optik - International Journal for Light and Electron Optics 130:1438\u20131444","journal-title":"Optik - International Journal for Light and Electron Optics"},{"issue":"14","key":"9568_CR3","doi-asserted-by":"publisher","first-page":"3073","DOI":"10.1016\/j.ins.2011.03.002","volume":"181","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen YH, Wang HC (2011) Meaningful secret sharing technique with authentication and remedy abilities. Inf Sci 181(14):3073\u20133084","journal-title":"Inf Sci"},{"key":"9568_CR4","doi-asserted-by":"crossref","unstructured":"Chavan PV, Atique M, Malik L (2014) Signature based authentication using contrast enhanced hierarchical visual cryptography. Electrical, Electronics and Computer Science. 1\u20135","DOI":"10.1109\/SCEECS.2014.6804453"},{"key":"9568_CR5","doi-asserted-by":"crossref","unstructured":"Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme Multimedia Tools and Applications","DOI":"10.1007\/s11042-017-5465-4"},{"key":"9568_CR6","unstructured":"DAIRYKO M, HOFFMAN C, PATTYSON J, PECK H (2013) On the spectrum of the penrose laplacian personal.denison.edu"},{"issue":"1","key":"9568_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/1385-7258(81)90016-0","volume":"84","author":"N de Bruijn","year":"1981","unstructured":"de Bruijn N (1981) Algebraic theory of penrose\u2019s non-periodic tilings of the plane. i. Indagationes Mathematicae (Proceedings) 84(1):39\u201352","journal-title":"Indagationes Mathematicae (Proceedings)"},{"issue":"4","key":"9568_CR8","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIFS.2014.2305574","volume":"9","author":"R De Prisco","year":"2014","unstructured":"De Prisco R, De Santis A (2014) On the relation of random grid and deterministic visual cryptography. IEEE transactions on information forensics and security 9(4):653\u2013665","journal-title":"IEEE transactions on information forensics and security"},{"key":"9568_CR9","doi-asserted-by":"crossref","unstructured":"El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing IEEE Access. vol. 6","DOI":"10.1109\/ACCESS.2018.2820603"},{"issue":"4","key":"9568_CR10","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.exmath.2008.02.001","volume":"26","author":"NP Frank","year":"2008","unstructured":"Frank NP (2008) A primer of substitution tilings of the euclidean plane. Expo Math 26(4):295\u2013326","journal-title":"Expo Math"},{"key":"9568_CR11","doi-asserted-by":"crossref","unstructured":"Fu ZX, Yu B (2014) Visual cryptography and random grids schemes. In: Digital-forensics and watermarking. Springer. Auckland, New Zealand, pp 109\u2013122","DOI":"10.1007\/978-3-662-43886-2_8"},{"issue":"5","key":"9568_CR12","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TIFS.2014.2384393","volume":"10","author":"M Fuyou","year":"2015","unstructured":"Fuyou M, Yan X, Xingfu W, Badawy M (2015) Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Transactions on Information Forensics and Security 10(5):889\u2013899","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9568_CR13","doi-asserted-by":"crossref","unstructured":"Gr\u00fcnbaum B, Shephard GC (1987) Tilings and patterns American Mathematical Monthly (95)","DOI":"10.2307\/2323440"},{"issue":"2","key":"9568_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4018\/IJDCF.2017040104","volume":"9","author":"T Guo","year":"2017","unstructured":"Guo T, Jiao J, Liu F, Wang W (2017) On the pixel expansion of visual cryptography scheme. International Journal of Digital Crime and Forensics 9(2):38\u201344","journal-title":"International Journal of Digital Crime and Forensics"},{"issue":"8","key":"9568_CR15","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo T, Liu F, Wu C (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094\u20132109","journal-title":"J Syst Softw"},{"key":"9568_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2018.09.024","volume":"473","author":"X Jia","year":"2019","unstructured":"Jia X, Wang D, Nie D, Luo X, Sun JZ (2019) A new threshold changeable secret sharing scheme based on the chinese remainder theorem. Inf Sci 473:13\u201330","journal-title":"Inf Sci"},{"issue":"2","key":"9568_CR17","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/s00145-015-9226-0","volume":"30","author":"I Komargodski","year":"2017","unstructured":"Komargodski I, Naor M, Yogev E (2017) Secret-Sharing For NP. J Cryptol 30(2):444\u2013469","journal-title":"J Cryptol"},{"issue":"1","key":"9568_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/LSP.2017.2777881","volume":"25","author":"Y Li","year":"2018","unstructured":"Li Y, Guo L (2018) Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Processing Letters 25(1):140\u2013144","journal-title":"IEEE Signal Processing Letters"},{"key":"9568_CR19","doi-asserted-by":"crossref","unstructured":"Li L, Hossain MS, El-Latif AAA, Alhamid MF (2017) Distortion less secret image sharing scheme for internet of things system Cluster Computing","DOI":"10.1007\/s10586-017-1345-y"},{"key":"9568_CR20","first-page":"210","volume":"65","author":"P Li","year":"2018","unstructured":"Li P, Liu Z, Yang CN (2018) A construction method of (t,k,n)-essential secret image sharing scheme. Signal Processing:, Image Communication 65:210\u2013220","journal-title":"Signal Processing:, Image Communication"},{"issue":"13","key":"9568_CR21","doi-asserted-by":"publisher","first-page":"16461","DOI":"10.1007\/s11042-017-5215-7","volume":"77","author":"X Liu","year":"2018","unstructured":"Liu X, Wang S, Sang J, Zhang W (2018) A novel lossless recovery algorithm for basic matrix-based vss. Multimedia Tools and Applications 77(13):16461\u201316476","journal-title":"Multimedia Tools and Applications"},{"key":"9568_CR22","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2018.04.043","volume":"453","author":"Y Liu","year":"2018","unstructured":"Liu Y, Yang C, Wang Y, Zhu L, Ji W (2018) Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf Sci 453:21\u201329","journal-title":"Inf Sci"},{"issue":"5","key":"9568_CR23","doi-asserted-by":"publisher","first-page":"6017","DOI":"10.1007\/s11042-017-4512-5","volume":"77","author":"YN Liu","year":"2018","unstructured":"Liu YN, Zhong Q, Xie M, Chen ZB (2018) A novel multiple-level secret image sharing scheme. Multimedia Tools and Applications 77(5):6017\u20136031","journal-title":"Multimedia Tools and Applications"},{"issue":"5815","key":"9568_CR24","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1126\/science.1135491","volume":"315","author":"PJ Lu","year":"2007","unstructured":"Lu PJ, Steinhardt PJ (2007) Decagonal and quasi-crystalline tilings in medieval islamic architecture. Science 315(5815):1106","journal-title":"Science"},{"key":"9568_CR25","doi-asserted-by":"crossref","unstructured":"Luo H, Lu ZM, Pan JS (2007) Multiple watermarking in visual cryptography. In: International Workshop on Digital Watermarking. 60\u201370","DOI":"10.1007\/978-3-540-92238-4_6"},{"key":"9568_CR26","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology-EUROCRYPT\u201994 lecture notes in computer science, workshop on the theory and application of cryptographic techniques, may, vol 9-12. Springer, Perugia, Italy, Springer, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"9568_CR27","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604\u2013621","journal-title":"Signal Process"},{"key":"9568_CR28","unstructured":"Penrose R (1974) The role of aesthetics in pure and applied mathematical research. Bulletin - Institute of Mathematics and its Applications, p 10"},{"key":"9568_CR29","unstructured":"Penrose tiling (2018) wikipedia"},{"issue":"11","key":"9568_CR30","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"1","key":"9568_CR31","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10623-016-0285-5","volume":"85","author":"G Shen","year":"2017","unstructured":"Shen G, Liu F, Fu Z, Yu B (2017) Perfect contrast xor-based visual cryptography schemes via linear algebra. Des Codes Crypt 85(1):15\u201337","journal-title":"Des Codes Crypt"},{"issue":"5","key":"9568_CR32","doi-asserted-by":"publisher","first-page":"6287","DOI":"10.1007\/s11042-017-4536-x","volume":"77","author":"S Shivani","year":"2018","unstructured":"Shivani S (2018) Multi secret sharing with unexpanded meaningful shares. Multimedia Tools and Applications 77(5):6287\u20136310","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"9568_CR33","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"DR Stinson","year":"1992","unstructured":"Stinson DR (1992) An explication of secret sharing schemes. Designs Codes & Cryptography 2(4):357\u2013390","journal-title":"Designs Codes & Cryptography"},{"key":"9568_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.patrec.2018.08.009","volume":"130","author":"W Wan","year":"2020","unstructured":"Wan W, Wang J, Li J, Meng L, Sun J, Zhang H, Liu J (2020) Pattern complexity-based jnd estimation for quantization watermarking. Pattern Recogn Lett 130:157\u2013164. Image\/Video Understanding and Analysis (IUVA)","journal-title":"Pattern Recogn Lett"},{"key":"9568_CR35","doi-asserted-by":"publisher","first-page":"4907","DOI":"10.1007\/s11042-018-6860-1","volume":"79","author":"W Wan","year":"2020","unstructured":"Wan W, Wang J, Li J, Sun J, Zhang H, Liu J (2020) Hybrid jnd model-guided watermarking method for screen content images. Multimedia Tools & Applications 79:4907\u20134930","journal-title":"Multimedia Tools & Applications"},{"issue":"3","key":"9568_CR36","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security. 4(3):383\u2013396","journal-title":"IEEE Trans. Inf. Forensics Security."},{"issue":"3","key":"9568_CR37","doi-asserted-by":"publisher","first-page":"85","DOI":"10.4018\/IJDCF.2016070106","volume":"8","author":"G Wang","year":"2016","unstructured":"Wang G, Liu F, Yan WQ (2016) Basic visual cryptography using braille. International Journal of Digital Crime & Forensics 8(3):85\u201393","journal-title":"International Journal of Digital Crime & Forensics"},{"key":"9568_CR38","doi-asserted-by":"crossref","unstructured":"Wang W, Liu F, Guo T, Ren Y (2017) Temporal integration based visual cryptography scheme and its application. In: Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25. 406\u2013419","DOI":"10.1007\/978-3-319-64185-0_30"},{"key":"9568_CR39","doi-asserted-by":"publisher","first-page":"112868","DOI":"10.1016\/j.eswa.2019.112868","volume":"140","author":"J Wang","year":"2020","unstructured":"Wang J, Wan WB, Li XX, Sun JD, Zhang HX (2020) Color image watermarking based on orientation diversity and color complexity. Expert Syst Appl 140:112868","journal-title":"Expert Syst Appl"},{"key":"9568_CR40","doi-asserted-by":"crossref","unstructured":"Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: In: Transactions on DHMS v, LNCS, vol 5. Springer-Verlag. Springer, Berlin, Heidelberg, pp 70\u2013105","DOI":"10.1007\/978-3-642-14298-7_5"},{"issue":"2S","key":"9568_CR41","doi-asserted-by":"publisher","first-page":"32:1","DOI":"10.1145\/2344436.2344438","volume":"8","author":"J Weir","year":"2012","unstructured":"Weir J, Yan W, Kankanhalli MS (2012) Image hatching for visual cryptography. ACM Trans. Multimedia Comput. Commun. Appl 8(2S):32:1\u201332:15","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl"},{"issue":"1","key":"9568_CR42","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11554-015-0540-4","volume":"14","author":"X Yan","year":"2018","unstructured":"Yan X., Liu X., Yang C. N. (2018) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc 14(1):61\u201373","journal-title":"J Real-Time Image Proc"},{"key":"9568_CR43","doi-asserted-by":"crossref","unstructured":"Yan X, Lu Y, Liu L, Song X (2020) Reversible image secret sharing. IEEE Transactions on Information Forensics and Security, Early Access","DOI":"10.1109\/TIFS.2020.3001735"},{"issue":"12","key":"9568_CR44","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","volume":"28","author":"CN Yang","year":"2010","unstructured":"Yang CN, Ciou CB (2010) Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image Vis Comput 28 (12):1600\u20131610","journal-title":"Image Vis Comput"},{"key":"9568_CR45","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.ins.2014.03.033","volume":"278","author":"CN Yang","year":"2014","unstructured":"Yang CN, Wu CC, Wang DS (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141\u2013173","journal-title":"Inf Sci"},{"key":"9568_CR46","unstructured":"Yang CN, Wu CC, Lin YC (2017) K out of n region-based progressive visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology, pp 1\u20131"},{"key":"9568_CR47","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.ins.2014.02.099","volume":"271","author":"CN Yang","year":"2014","unstructured":"Yang CN, Yang YY (2014) New extended visual cryptography schemes with clearer shadow images. Inf Sci 271:246\u2013263","journal-title":"Inf Sci"},{"key":"9568_CR48","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Mu Y, Wu QMJ (2019) Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23:4927\u20134938","journal-title":"Soft Comput"},{"key":"9568_CR49","doi-asserted-by":"crossref","unstructured":"Zhou Z, Wu QMJ, Yang Y, Sun X (2020) Region-level visual consistency verification for large-scale partial-duplicate image search. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)","DOI":"10.1145\/3383582"},{"key":"9568_CR50","doi-asserted-by":"crossref","unstructured":"Zou S, Liang Y, Lai L, Shamai S (2014) An Information Theoretic Approach to Secret Sharing Arxiv preprint","DOI":"10.1109\/TIT.2015.2421905"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09568-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09568-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09568-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T01:17:43Z","timestamp":1668129463000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09568-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,29]]},"references-count":50,"journal-issue":{"issue":"43-44","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["9568"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09568-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,8,29]]},"assertion":[{"value":"26 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}