{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T07:27:55Z","timestamp":1757575675585,"version":"3.37.3"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T00:00:00Z","timestamp":1599091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T00:00:00Z","timestamp":1599091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Ministry of Science and Technology","doi-asserted-by":"publisher","award":["XXX"],"award-info":[{"award-number":["XXX"]}],"id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09723-7","type":"journal-article","created":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T15:03:30Z","timestamp":1599145410000},"page":"517-541","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Utilization of secret sharing technology for secure communication: a state-of-the-art review"],"prefix":"10.1007","volume":"80","author":[{"given":"Parsa","family":"Sarosh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-0912","authenticated-orcid":false,"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[]},{"given":"G. M.","family":"Bhat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,3]]},"reference":[{"key":"9723_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.17148\/IARJSET.2017.4313","volume":"4","author":"H Abdolrahimpour","year":"2017","unstructured":"Abdolrahimpour H, Shahab E (2017) A Short Survey of Visual Cryptography and Secret Image Sharing Techniques and Applications. Int Adv Res J Sci Eng Technol 4:58\u201362. https:\/\/doi.org\/10.17148\/IARJSET.2017.4313","journal-title":"Int Adv Res J Sci Eng Technol"},{"key":"9723_CR2","volume-title":"Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography","author":"AA Abdulla","year":"2015","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. University of Buckingham, Buckingham"},{"key":"9723_CR3","doi-asserted-by":"publisher","unstructured":"Aldosary S, Howells G (2012) A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir\u2019s Secret Sharing Algorithm, 2012 Third International Conference on Emerging Security Technologies, Lisbon, pp. 66\u201369, https:\/\/doi.org\/10.1109\/EST.2012.9","DOI":"10.1109\/EST.2012.9"},{"key":"9723_CR4","doi-asserted-by":"publisher","unstructured":"Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing, 2010 IEEE International Conference on Multimedia and Expo, Suntec City, pp 1661-1666, https:\/\/doi.org\/10.1109\/ICME.2010.5583180","DOI":"10.1109\/ICME.2010.5583180"},{"key":"9723_CR5","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"CA Asmuth","year":"1983","unstructured":"Asmuth CA, Bloom J (1983) A Modular Approach to Key Safeguarding. IEEE Trans Inf Theory 29:208\u2013210. https:\/\/doi.org\/10.1109\/TIT.1983.1056651","journal-title":"IEEE Trans Inf Theory"},{"key":"9723_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"Ateniese","year":"2001","unstructured":"Ateniese et al (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250:143\u2013161","journal-title":"Theor Comput Sci"},{"issue":"4","key":"9723_CR7","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1504\/IJSN.2009.028667","volume":"4","author":"L Bai","year":"2009","unstructured":"Bai L, Zou X (2009) A proactive secret sharing scheme in matrix projection method. Int J Secur Netw 4(4):201\u2013209","journal-title":"Int J Secur Netw"},{"key":"9723_CR8","doi-asserted-by":"crossref","unstructured":"Bai L, Biswas S, Ortiz A, Dalessandro D (2006) An Image Secret Sharing Method, Proceeding of 9th International Conference on Information Fusion, Italy, pp. 1\u20136","DOI":"10.1109\/ICIF.2006.301805"},{"key":"9723_CR9","doi-asserted-by":"crossref","unstructured":"Beutelspacher A (1992) How to say \u2018No\u2019, Advances in Cryptology-EUROCRYPT 89, Lect Notes Comp Sci, Springer-Verlag, 434: 491\u2013496","DOI":"10.1007\/3-540-46885-4_47"},{"key":"9723_CR10","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-662-49387-8_13","volume":"9615","author":"A Bishop","year":"2016","unstructured":"Bishop A, Pastro V (2016) Robust secret sharing schemes against local adversaries. Lect Notes Comput Sci 9615:327\u2013356","journal-title":"Lect Notes Comput Sci"},{"key":"9723_CR11","first-page":"313","volume":"48","author":"R Blakley","year":"1979","unstructured":"Blakley R (1979) Safeguarding Cryptographic Keys. Proc AFIPS 1979 Natl Comp Conf 48:313\u2013317","journal-title":"Proc AFIPS 1979 Natl Comp Conf"},{"key":"9723_CR12","first-page":"546","volume-title":"Advances in Cryptology - CRYPTO '92\u2033, Lecture Notes in Computer Science","author":"B Blakley","year":"1993","unstructured":"Blakley B, Blakley GR, Chan AH, Massey J (1993) Threshold Schemes with Disenrollment. In: Brickell E (ed) Advances in Cryptology - CRYPTO '92\u2033, Lecture Notes in Computer Science, vol 740. Springer-Verlag, Berlin, pp 546\u2013554"},{"key":"9723_CR13","doi-asserted-by":"crossref","unstructured":"Blundo et al. (1993) Perfect secure Key Distribution for Dynamic conferences. Advances in Cryptology-CRYPTO\u201996, LNCS, Springer, Berlin, vol. 740, pp. 471\u2013486","DOI":"10.1007\/3-540-48071-4_33"},{"key":"9723_CR14","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/0304-3975(96)00003-5","volume":"165","author":"C Blundo","year":"1996","unstructured":"Blundo C, Cresti A, Santis AD, Vaccaro U (1996) Fully dynamic secret sharing schemes. Theor Comput Sci 165:407\u2013440. https:\/\/doi.org\/10.1016\/0304-3975(96)00003-5","journal-title":"Theor Comput Sci"},{"issue":"2","key":"9723_CR15","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/TCC.2015.2396072","volume":"6","author":"M Cafaro","year":"2018","unstructured":"Cafaro M, Pell\u00e8 P (2018) Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation. IEEE Transact Cloud Comput 6(2):453\u2013463. https:\/\/doi.org\/10.1109\/TCC.2015.2396072","journal-title":"IEEE Transact Cloud Comput"},{"key":"9723_CR16","doi-asserted-by":"publisher","unstructured":"Chang JJ, Li M, Wang Y, Juan JS (2010) Two-image encryption by random grids. 2010 10th International Symposium on Communications and Information Technologies, Tokyo, pp. 458\u2013463. https:\/\/doi.org\/10.1109\/ISCIT.2010.5664885","DOI":"10.1109\/ISCIT.2010.5664885"},{"key":"9723_CR17","doi-asserted-by":"publisher","unstructured":"Chen T-H, Lee Y-S (2009) Yet Another Friendly Progressive Visual Secret Sharing Scheme, IIH-MSP 2009\u20132009 5th international conference on intelligent information hiding and multimedia signal processing. pp. 353-356, https:\/\/doi.org\/10.1109\/IIH-MSP.2009.135","DOI":"10.1109\/IIH-MSP.2009.135"},{"key":"9723_CR18","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"T-H Chen","year":"2009","unstructured":"Chen T-H, Tsao K-H (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42:2203\u20132217. https:\/\/doi.org\/10.1016\/j.patcog.2008.11.015","journal-title":"Pattern Recogn"},{"key":"9723_CR19","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T-H Chen","year":"2011","unstructured":"Chen T-H, Tsao K-H (2011) Threshold visual secret sharing by random grids. J Syst Softw 84:1197\u20131208. https:\/\/doi.org\/10.1016\/j.jss.2011.02.023","journal-title":"J Syst Softw"},{"key":"9723_CR20","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.image.2016.03.006","volume":"44","author":"TH Chen","year":"2016","unstructured":"Chen TH, Lee YS, Lin CH (2016) On the difficulty of aligning VSS random grids. Signal Process Image Commun 44:101\u2013107","journal-title":"Signal Process Image Commun"},{"key":"9723_CR21","doi-asserted-by":"publisher","first-page":"7865","DOI":"10.1007\/s11042-017-4680-3","volume":"77","author":"T Chen","year":"2017","unstructured":"Chen T, Lin K, Lin C (2017) On the design of a two-decoding-option image secret sharing scheme. Multimed Tools Appl 77:7865\u20137881","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"9723_CR22","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1109\/TIFS.2018.2819125","volume":"13","author":"Y Cheng","year":"2018","unstructured":"Cheng Y, Fu Z, Yu B (2018) Improved visual secret sharing scheme for QR code applications. IEEE Transact Info Forensics Secur 13(9):2393\u20132403. https:\/\/doi.org\/10.1109\/TIFS.2018.2819125","journal-title":"IEEE Transact Info Forensics Secur"},{"key":"9723_CR23","doi-asserted-by":"crossref","unstructured":"Cimato S, Yang CN (2017) Visual Cryptography and Secret Image Sharing, Inc. Boca Raton, FL, USA, CRC Press","DOI":"10.1201\/b11068"},{"key":"9723_CR24","doi-asserted-by":"crossref","unstructured":"Cimato S, Prisco RD, Santis AD (2004) Colored Visual Cryptography Without Color Darkening, In Blundo C., Cimato S. (eds) Security in Communication Networks. SCN. Lecture notes in computer science, vol 3352, 2005 Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-540-30598-9_17"},{"key":"9723_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2005","unstructured":"Cimato S et al (2005) Probabilistic visual cryptography schemes. Comput J 49:1\u201310. https:\/\/doi.org\/10.1093\/comjnl\/bxh152","journal-title":"Comput J"},{"key":"9723_CR26","doi-asserted-by":"publisher","unstructured":"Deepika MP, Sreekumar A (2017) Visual secret sharing using Newton interpolation polynomial and mod operator with PNG images. 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, pp. 1-8. https:\/\/doi.org\/10.1109\/ICIIECS.2017.8275917","DOI":"10.1109\/ICIIECS.2017.8275917"},{"key":"9723_CR27","doi-asserted-by":"crossref","unstructured":"Degadwala S, Vyas D, Mahajan A (2019) Binary Image Random Grid (2, n)-Visual Cryptography Scheme. Proceedings of International Conference on Advancements in Computing & Management (ICACM)","DOI":"10.2139\/ssrn.3446656"},{"key":"9723_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCCT.2010.5670739","volume-title":"Enhanced visual secret sharing scheme via halftoning technique","author":"SE Devi","year":"2010","unstructured":"Devi SE (2010) Enhanced visual secret sharing scheme via halftoning technique. https:\/\/doi.org\/10.1109\/ICCCCT.2010.5670739"},{"key":"9723_CR29","doi-asserted-by":"publisher","first-page":"530","DOI":"10.3390\/sym10100530","volume":"10","author":"W Ding","year":"2018","unstructured":"Ding W, Liu K, Yan X, Wang H, Liu L, Gong Q (2018) An image secret sharing method based on matrix theory. Symmetry 10:530. https:\/\/doi.org\/10.3390\/sym10100530","journal-title":"Symmetry"},{"key":"9723_CR30","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1134\/S1054661806040080","volume":"16","author":"WP Fang","year":"2006","unstructured":"Fang WP, Lin JC (2006) Progressive viewing and sharing of sensitive images. Pattern Recognit Image Anal 16:632\u2013636. https:\/\/doi.org\/10.1134\/S1054661806040080","journal-title":"Pattern Recognit Image Anal"},{"issue":"3","key":"9723_CR31","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.jss.2004.07.250","volume":"76","author":"Feng","year":"2005","unstructured":"Feng et al (2005) A new multi-secret images sharing scheme using Lagrange's interpolation. J Syst Softw 76(3):327\u2013339","journal-title":"J Syst Softw"},{"key":"9723_CR32","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86:2094\u20132109","journal-title":"J Syst Softw"},{"key":"9723_CR33","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.ipl.2015.06.014","volume":"115","author":"L Harn","year":"2015","unstructured":"Harn L, Hsu CF (2015, ISSN 0020-0190) Dynamic threshold secret reconstruction and its application to the threshold cryptography. Inf Process Lett 115:851\u2013857. https:\/\/doi.org\/10.1016\/j.ipl.2015.06.014","journal-title":"Inf Process Lett"},{"key":"9723_CR34","doi-asserted-by":"publisher","unstructured":"Haryanto et al. (2017) Implementation of image-based secret-sharing on communication between mobile devices, 2017 Second International Conference on Informatics and Computing (ICIC), Jayapura, pp. 1\u20136. https:\/\/doi.org\/10.1109\/IAC.2017.8280573","DOI":"10.1109\/IAC.2017.8280573"},{"key":"9723_CR35","doi-asserted-by":"crossref","unstructured":"Herzberg A, Jarecki S, Krawczyk H, Yung M (1995) Proactive secret sharing, Advances in Cryptology \u2013 CRYPTO\u201995, pp. 339\u2013352","DOI":"10.1007\/3-540-44750-4_27"},{"key":"9723_CR36","doi-asserted-by":"publisher","unstructured":"Hu H, Shen G, Liu Y, Fu Z, Yu B (2018) Improved schemes for visual secret sharing based on random grids. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6738-2","DOI":"10.1007\/s11042-018-6738-2"},{"issue":"5","key":"9723_CR37","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TCSVT.2016.2631404","volume":"28","author":"X Jia","year":"2018","unstructured":"Jia X, Wang D, Nie D, Zhang C (2018) Collaborative visual cryptography schemes. IEEE Transact Circ Syst Vid Technol 28(5):1056\u20131070. https:\/\/doi.org\/10.1109\/TCSVT.2016.2631404","journal-title":"IEEE Transact Circ Syst Vid Technol"},{"key":"9723_CR38","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2018.09.024","volume":"473","author":"X Jia","year":"2019","unstructured":"Jia X, Wang D, Nie D, Luo X, Sun JZ (2019) A new threshold changeable secret sharing scheme based on the Chinese remainder theorem. Inf Sci 473:13\u201330","journal-title":"Inf Sci"},{"key":"9723_CR39","doi-asserted-by":"crossref","unstructured":"Jin D, Yan WQ, Kankanhalli MS (2005) Progressive colour visual cryptography, SPIE J Electron Imaging 14","DOI":"10.1117\/1.1993625"},{"key":"9723_CR40","doi-asserted-by":"publisher","first-page":"033019","DOI":"10.1117\/1.1993625","volume":"14","author":"D Jin","year":"2005","unstructured":"Jin D, Yan W, Kankanhalli M (2005) Progressive color visual cryptography. J Electronic Imaging 14:033019","journal-title":"J Electronic Imaging"},{"key":"9723_CR41","doi-asserted-by":"publisher","first-page":"033019","DOI":"10.1117\/1.1993625","volume":"14","author":"D Jin","year":"2005","unstructured":"Jin D et al (2005) Progressive color visual cryptography. J Electron Imaging 14:033019. https:\/\/doi.org\/10.1117\/1.1993625","journal-title":"J Electron Imaging"},{"issue":"2","key":"9723_CR42","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","volume":"11","author":"A Jolfaei","year":"2016","unstructured":"Jolfaei A, Wu X, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Transact Info Forensics Secur 11(2):235\u2013246. https:\/\/doi.org\/10.1109\/TIFS.2015.2489178","journal-title":"IEEE Transact Info Forensics Secur"},{"key":"9723_CR43","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12:377\u2013379","journal-title":"Opt Lett"},{"key":"9723_CR44","doi-asserted-by":"publisher","unstructured":"Kaneko N, Iwamura K (2016) Proactive secret sharing scheme suitable for asymmetric secret sharing scheme, 2016 IEEE 5th Global Conference on Consumer Electronics, Kyoto, pp. 1\u20132. https:\/\/doi.org\/10.1109\/GCCE.2016.7800467","DOI":"10.1109\/GCCE.2016.7800467"},{"key":"9723_CR45","doi-asserted-by":"publisher","unstructured":"Kaneko N, Iwamura K (2017) Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme, 2017 31st international conference on advanced information networking and applications workshops (WAINA), Taipei, pp. 13\u201318. https:\/\/doi.org\/10.1109\/WAINA.2017.61","DOI":"10.1109\/WAINA.2017.61"},{"key":"9723_CR46","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson A, Koashi M, Imoto N (1999) Quantum entanglement for secret sharing and secret splitting. Phys Rev A 59:162\u2013168. https:\/\/doi.org\/10.1103\/PhysRevA.59.162","journal-title":"Phys Rev A"},{"key":"9723_CR47","doi-asserted-by":"publisher","unstructured":"Komargodski I, Cherniavsky AP (2017) Evolving Secret Sharing: Dynamic Thresholds and Robustness, pp. 379\u2013393 https:\/\/doi.org\/10.1007\/978-3-319-70503-3_12","DOI":"10.1007\/978-3-319-70503-3_12"},{"key":"9723_CR48","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-48329-2_12","volume":"773","author":"H Krawczyk","year":"1994","unstructured":"Krawczyk H (1994) Secret sharing made short. Adv Cryptol -- CRYPTO '93, Lect Notes Comput Sci 773:136\u2013146","journal-title":"Adv Cryptol -- CRYPTO '93, Lect Notes Comput Sci"},{"key":"9723_CR49","doi-asserted-by":"crossref","unstructured":"Kukreja S, SinghKasana S, Kasana G (2018) Random Grid-Based Extended Visual Secret Sharing Scheme for Image Authentication, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 870\u2013875","DOI":"10.1109\/CONFLUENCE.2018.8442463"},{"issue":"2","key":"9723_CR50","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1049\/iet-ipr.2012.0338","volume":"7","author":"Y Lee","year":"2013","unstructured":"Lee Y, Wang B, Chen T (2013) Quality-improved threshold visual secret sharing scheme by random grids. IET Image Process 7(2):137\u2013143. https:\/\/doi.org\/10.1049\/iet-ipr.2012.0338","journal-title":"IET Image Process"},{"key":"9723_CR51","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.1016\/j.patcog.2007.04.001","volume":"40","author":"SJ Lin","year":"2007","unstructured":"Lin SJ, Lin JC (2007) VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn 40:3652\u20133666. https:\/\/doi.org\/10.1016\/j.patcog.2007.04.001","journal-title":"Pattern Recogn"},{"issue":"3","key":"9723_CR52","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"CC Lin","year":"2004","unstructured":"Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405\u2013414","journal-title":"J Syst Softw"},{"key":"9723_CR53","doi-asserted-by":"publisher","unstructured":"Lin CC, Tsai WH Secret image sharing with the capability of share data reduction. Soc Photo-Optical Instrument Eng 42:2340\u20132345. https:\/\/doi.org\/10.1117\/1.1588661","DOI":"10.1117\/1.1588661"},{"key":"9723_CR54","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.jvcir.2015.08.018","volume":"33","author":"C-H Lin","year":"2015","unstructured":"Lin C-H, Lee Y-S, Chen T-H (2015) Friendly progressive random-grid\u2013based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31\u201341. https:\/\/doi.org\/10.1016\/j.jvcir.2015.08.018","journal-title":"J Vis Commun Image Represent"},{"key":"9723_CR55","doi-asserted-by":"publisher","unstructured":"Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows, Signal Processing: Image Communication https:\/\/doi.org\/10.1016\/j.image.2017.06.011","DOI":"10.1016\/j.image.2017.06.011"},{"key":"9723_CR56","doi-asserted-by":"publisher","first-page":"20673","DOI":"10.1007\/s11042-017-5482-3","volume":"77","author":"X Liu","year":"2017","unstructured":"Liu X, Wang SY, Yan X, Zhang W (2017) Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multimed Tools Appl 77:20673\u201320696","journal-title":"Multimed Tools Appl"},{"key":"9723_CR57","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1186\/s13638-018-1084-7","volume":"2018","author":"YX Liu","year":"2018","unstructured":"Liu YX, Sun QD, Yang CN (2018) (k,n) secret image sharing scheme capable of cheating detection. EURASIP J Wirel Commun Netw 2018:1687\u20131499. https:\/\/doi.org\/10.1186\/s13638-018-1084-7","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"9723_CR58","unstructured":"Lukac R, Plataniotis KN (2004) A secret sharing scheme for image encryption, Proceedings. Elmar-2004. 46th international symposium on electronics in marine, Zadar, Croatia, pp. 549\u2013554"},{"key":"9723_CR59","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.patcog.2004.11.010","volume":"38","author":"R Lukac","year":"2005","unstructured":"Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38:767\u2013772","journal-title":"Pattern Recogn"},{"key":"9723_CR60","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"RJ McEliece","year":"1981","unstructured":"McEliece RJ, Sarwate DV (1981) On sharing secrets and reed-Solomon codes. Commun ACM 24:583\u2013584. https:\/\/doi.org\/10.1145\/358746.358762","journal-title":"Commun ACM"},{"key":"9723_CR61","first-page":"1","volume":"950","author":"M Naor","year":"1995","unstructured":"Naor M, Shamir A (1995) Visual Cryptography. Proc Adv Cryptol\u2014 EUROCRYPT\u201994, Lect Notes Comput Sci 950:1\u201312","journal-title":"Proc Adv Cryptol\u2014 EUROCRYPT\u201994, Lect Notes Comput Sci"},{"key":"9723_CR62","doi-asserted-by":"publisher","unstructured":"Ogata W, Kurosawa K (1996) Optimum Secret Sharing Scheme Secure against Cheating,\u201d Advances in Cryptology-EUROCRYPT \u201896, pp. 200\u2013211, https:\/\/doi.org\/10.1007\/3-540-68339-9_18","DOI":"10.1007\/3-540-68339-9_18"},{"key":"9723_CR63","doi-asserted-by":"publisher","unstructured":"Parakh, Kak S (2009) Recursive secret sharing for distributed storage and information hiding, 2009 IEEE3rd International Symposium on Advanced Networks and Telecommunication Systems(ANTS), New Delhi, pp. 1\u20133. https:\/\/doi.org\/10.1109\/ANTS.2009.5409868","DOI":"10.1109\/ANTS.2009.5409868"},{"key":"9723_CR64","unstructured":"Parakh et al. (2009) A Tree-Based Recursive Scheme for Space Efficient Secret Sharing, IACR Cryptology ePrint Archive. 409"},{"key":"9723_CR65","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.jvcir.2012.01.003","volume":"23","author":"L Peng","year":"2012","unstructured":"Peng L et al (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23:441\u2013453","journal-title":"J Vis Commun Image Represent"},{"key":"9723_CR66","doi-asserted-by":"publisher","first-page":"1380","DOI":"10.1016\/j.jvcir.2013.06.004","volume":"24","author":"L Peng","year":"2013","unstructured":"Peng L et al (2013) Sharing more information in gray visual cryptography scheme. J Vis Commun Image Represent 24:1380\u20131393","journal-title":"J Vis Commun Image Represent"},{"key":"9723_CR67","doi-asserted-by":"publisher","unstructured":"Rajaram S, Suganya R (2017) Embedded visual cryptography for the secure transmission of bank cheque, 2017 IEEE International Conference on Circuits and Systems (ICCS), Thiruvananthapuram, pp. 452\u2013458, https:\/\/doi.org\/10.1109\/ICCS1.2017.8326041","DOI":"10.1109\/ICCS1.2017.8326041"},{"key":"9723_CR68","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3923\/rjit.2013.67.72","volume":"5","author":"SKN Sarma","year":"2013","unstructured":"Sarma SKN, Lamkuche H, Umamaheswa S (2013) A review of secret sharing schemes. Res J Inf Technol 5:67\u201372. https:\/\/doi.org\/10.3923\/rjit.2013.67.72","journal-title":"Res J Inf Technol"},{"issue":"2","key":"9723_CR69","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TIFS.2017.2750104","volume":"13","author":"M Sasaki","year":"2018","unstructured":"Sasaki M, Watanabe Y (2018) Visual secret sharing schemes encrypting multiple images. IEEE Transact Info Forensics Secur 13(2):356\u2013365. https:\/\/doi.org\/10.1109\/TIFS.2017.2750104","journal-title":"IEEE Transact Info Forensics Secur"},{"key":"9723_CR70","doi-asserted-by":"publisher","unstructured":"Sathik MM, Selvi AK (2010) Secret sharing scheme for data encryption based on polynomial coefficient, Second International Conference on Computing, Communication and Networking Technologies, Karur, pp. 1\u20135, https:\/\/doi.org\/10.1109\/ICCCNT.2010.5591565","DOI":"10.1109\/ICCCNT.2010.5591565"},{"issue":"11","key":"9723_CR71","first-page":"612","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun Assoc Comput Mach 22(11):612\u2013613","journal-title":"Commun Assoc Comput Mach"},{"key":"9723_CR72","doi-asserted-by":"publisher","first-page":"12871","DOI":"10.1007\/s11042-017-4921-5","volume":"77","author":"G Shen","year":"2017","unstructured":"Shen G, Liu F, Fu Z, Yu B (2017) Visual cryptograms of random grids via linear algebra. Multimed Tools Appl 77:12871\u201312899","journal-title":"Multimed Tools Appl"},{"key":"9723_CR73","doi-asserted-by":"publisher","unstructured":"Shi R, Zhong H (2009) A Secret Sharing Scheme with the Changeable Threshold Value, 2009 International symposium on information engineering and electronic commerce, Ternopil, pp. 233\u2013236. https:\/\/doi.org\/10.1109\/IEEC.2009.54","DOI":"10.1109\/IEEC.2009.54"},{"key":"9723_CR74","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"S Shyu","year":"2009","unstructured":"Shyu S (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582\u20131596. https:\/\/doi.org\/10.1016\/j.patcog.2008.08.023","journal-title":"Pattern Recogn"},{"key":"9723_CR75","doi-asserted-by":"publisher","unstructured":"Shyu S (2014) Visual secret sharing with meaningful shares, Proceedings of 2014 Science and Information Conference, SAI. 576\u2013580. https:\/\/doi.org\/10.1109\/SAI.2014.6918244","DOI":"10.1109\/SAI.2014.6918244"},{"issue":"9","key":"9723_CR76","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1109\/TCSVT.2017.2707923","volume":"28","author":"SJ Shyu","year":"2018","unstructured":"Shyu SJ (2018) XOR-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Transact Circuits Syst Vid Technol 28(9):2397\u20132401. https:\/\/doi.org\/10.1109\/TCSVT.2017.2707923","journal-title":"IEEE Transact Circuits Syst Vid Technol"},{"key":"9723_CR77","doi-asserted-by":"publisher","unstructured":"Shyu SJ, Chen Y (2008) Threshold Secret Image Sharing by Chinese Remainder Theorem. IEEE Asia-Pacific Services Computing Conference, Yilan, pp 1332-1337. https:\/\/doi.org\/10.1109\/APSCC.2008.223","DOI":"10.1109\/APSCC.2008.223"},{"issue":"5","key":"9723_CR78","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765\u2013770","journal-title":"Comput Graph"},{"issue":"12","key":"9723_CR79","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"CC Thien","year":"2003","unstructured":"Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Transact Circ Syst Vid Technol 13(12):1161\u20131169","journal-title":"IEEE Transact Circ Syst Vid Technol"},{"key":"9723_CR80","doi-asserted-by":"publisher","unstructured":"Tochikubo K (2017) Multiple assignment secret sharing scheme using hierarchical threshold scheme. 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, pp. 456\u2013461. https:\/\/doi.org\/10.23919\/ICITST.2017.8356447","DOI":"10.23919\/ICITST.2017.8356447"},{"key":"9723_CR81","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF02252871","volume":"1","author":"M Tompa","year":"1989","unstructured":"Tompa M, Woll HJ (1989) How to share a secret with cheaters. Cryptology 1:133\u2013138. https:\/\/doi.org\/10.1007\/BF02252871","journal-title":"Cryptology"},{"key":"9723_CR82","doi-asserted-by":"publisher","unstructured":"Tsai CS, Chang CC (2001) A Generalized Secret Image Sharing and Recovery Scheme,\u201d Advances in Multimedia Information Processing \u2014 PCM, SN - 978-3-540-45453-3ID - https:\/\/doi.org\/10.1007\/3-540-45453-5_129","DOI":"10.1007\/3-540-45453-5_129"},{"key":"9723_CR83","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0164-1212(02)00034-1","volume":"64","author":"Tsai","year":"2002","unstructured":"Tsai et al (2002) Sharing multiple secrets in digital images. J Syst Softw 64:163\u2013170. https:\/\/doi.org\/10.1016\/S0164-1212(02)00034-1","journal-title":"J Syst Softw"},{"key":"9723_CR84","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1179\/174313107X214330","volume":"56","author":"D-S Tsai","year":"2008","unstructured":"Tsai D-S, Chen T, Horng G (2008) On generating meaningful shares in visual secret sharing scheme. Imaging Sci J 56:49\u201355. https:\/\/doi.org\/10.1179\/174313107X214330","journal-title":"Imaging Sci J"},{"issue":"4","key":"9723_CR85","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.image.2006.12.012","volume":"22","author":"RZ Wang","year":"2007","unstructured":"Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363\u2013373","journal-title":"Signal Process Image Commun"},{"key":"9723_CR86","doi-asserted-by":"publisher","first-page":"922","DOI":"10.6633\/IJNS.201711.19(6).08","volume":"19","author":"Weng","year":"2017","unstructured":"Weng et al (2017) A Novel Weighted Visual Cryptography Scheme with High Visual Quality. Int J Netw Secur 19:922\u2013928. https:\/\/doi.org\/10.6633\/IJNS.201711.19(6).08","journal-title":"Int J Netw Secur"},{"key":"9723_CR87","first-page":"2","volume":"49","author":"KS Wu","year":"2013","unstructured":"Wu KS (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 49:2\u20135","journal-title":"EURASIP J Adv Signal Process"},{"key":"9723_CR88","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11554-016-0639-2","volume":"14","author":"X Yan","year":"2018","unstructured":"Yan X, Lu YJ (2018) Participants increasing for threshold random grids-based visual secret sharing. Real-Time Image Proc 14:13\u201324. https:\/\/doi.org\/10.1007\/s11554-016-0639-2","journal-title":"Real-Time Image Proc"},{"key":"9723_CR89","doi-asserted-by":"publisher","first-page":"3114","DOI":"10.1016\/j.patcog.2008.03.031","volume":"41","author":"CN Yang","year":"2008","unstructured":"Yang CN, Chen TS (2008) Colored visual cryptography scheme based on additive colour mixing. Pattern Recogn 41:3114\u20133129","journal-title":"Pattern Recogn"},{"key":"9723_CR90","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","volume":"28","author":"CN Yang","year":"2010","unstructured":"Yang CN, Ciou CB (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28:1600\u20131610. https:\/\/doi.org\/10.1016\/j.imavis.2010.04.003","journal-title":"Image Vis Comput"},{"issue":"9","key":"9723_CR91","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1016\/j.optcom.2009.12.077","volume":"283","author":"CN Yang","year":"2010","unstructured":"Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750\u20131762","journal-title":"Opt Commun"},{"key":"9723_CR92","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"Yang","year":"2004","unstructured":"Yang et al (2004) New visual secret sharing schemes using the probabilistic method. Pattern Recogn Lett 25:481\u2013494. https:\/\/doi.org\/10.1016\/j.patrec.2003.12.011","journal-title":"Pattern Recogn Lett"},{"key":"9723_CR93","doi-asserted-by":"publisher","unstructured":"Yang CN et al (2007) Improvements of image sharing with steganography and authentication. J Syst Softw https:\/\/doi.org\/10.1016\/j.jss.2006.11.022","DOI":"10.1016\/j.jss.2006.11.022"},{"key":"9723_CR94","doi-asserted-by":"publisher","unstructured":"Zhang Y (2010) A Secret Sharing Scheme via Skew Polynomials, 2010 International Conference on Computational Science and Its Applications, Fukuoka, pp. 33\u201338, https:\/\/doi.org\/10.1109\/ICCSA.2010.32","DOI":"10.1109\/ICCSA.2010.32"},{"key":"9723_CR95","doi-asserted-by":"publisher","unstructured":"Zhang X, Zhang L, Zhang Q, Tang C (2008) A secret sharing shuffling scheme based on polynomial, 2008 International Conference on Information and Automation, Changsha, pp. 1746-1750. https:\/\/doi.org\/10.1109\/ICINFA.2008.4608288","DOI":"10.1109\/ICINFA.2008.4608288"},{"key":"9723_CR96","doi-asserted-by":"publisher","first-page":"15021","DOI":"10.1109\/ACCESS.2018.2811722","volume":"6","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Yang C, Cao Y, Sun X (2018) Secret image sharing based on encrypted pixels. IEEE Access 6:15021\u201315025. https:\/\/doi.org\/10.1109\/ACCESS.2018.2811722","journal-title":"IEEE Access"},{"key":"9723_CR97","doi-asserted-by":"publisher","unstructured":"Zhou Y et al (2018) Quantum Secret Sharing Among Four Players Using Multipartite Bound Entanglement of an Optical Field. Phys Rev Lett 121. https:\/\/doi.org\/10.1103\/PhysRevLett.121.150502","DOI":"10.1103\/PhysRevLett.121.150502"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09723-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09723-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09723-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T16:53:11Z","timestamp":1630687991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09723-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,3]]},"references-count":97,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9723"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09723-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,9,3]]},"assertion":[{"value":"2 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}