{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:46:40Z","timestamp":1772027200387,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10065-7","type":"journal-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T21:06:13Z","timestamp":1604955973000},"page":"9255-9280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RETRACTED ARTICLE: An effective secret image sharing using\n            quantum logic and GPGPU based EDNN super-resolution"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1627-552X","authenticated-orcid":false,"given":"M. Raviraja","family":"Holla","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4571-4608","authenticated-orcid":false,"given":"Alwyn R.","family":"Pais","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"issue":"01","key":"10065_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4236\/jsea.2017.101001","volume":"10","author":"RI Al-Khalid","year":"2017","unstructured":"Al-Khalid RI, Al-Dallah RA, Al-Anani AM, Barham RM, Hajir SI (2017)\n                    A secure visual cryptography scheme using private key with invariant share\n                    sizes. J Softw Eng Appl 10(01):1\u201310","journal-title":"J Softw Eng Appl"},{"key":"10065_CR2","doi-asserted-by":"crossref","unstructured":"Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for\n                    secret image sharing using GAS Algorithm. Int J Comput Appl\n                    92(8)","DOI":"10.5120\/16028-5079"},{"key":"10065_CR3","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.sigpro.2019.03.018","volume":"162","author":"Y Cao","year":"2019","unstructured":"Cao Y, He Z, Ye Z, Li X, Cao Y, Yang J (2019) Fast and accurate\n                    single image super-resolution via an energy-aware improved deep residual\n                    network. Signal Process 162:115\u2013125","journal-title":"Signal Process"},{"key":"10065_CR4","doi-asserted-by":"crossref","unstructured":"De Prisco, Roberto, Alfredo De Santis On the relation of random\n                    grid and deterministic visual cryptography, IEEE Trans Information Forensics\n                    Secur 9, no. 4 (2014): 653\u2013665.","DOI":"10.1109\/TIFS.2014.2305574"},{"key":"10065_CR5","doi-asserted-by":"publisher","first-page":"101941","DOI":"10.1016\/j.bspc.2020.101941","volume":"60","author":"B Deka","year":"2020","unstructured":"Deka B, Datta S, Mullah HU, Hazarika S (2020) Diffusion-weighted\n                    and spectroscopic MRI super-resolution using sparse representations. Biomed\n                    Signal Process Contrl 60:101941","journal-title":"Biomed Signal Process Contrl"},{"issue":"8","key":"10065_CR6","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1109\/TCSVT.2018.2864777","volume":"29","author":"Z He","year":"2018","unstructured":"He Z, Tang S, Yang J, Cao Y, Yang MY, Cao Y (2018) Cascaded deep\n                    networks with multiple receptive fields for infrared image super-resolution.\n                    IEEE Trans Circuits Syst Video Technol 29(8):2310\u20132322","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10065_CR7","unstructured":"Hou YC, BPVSS (2012) http:\/\/mail.im.tku.edu.tw\/\u223cychou\/BPVSS\/\n                    [Online; Ac- cessed 21 October 2016]"},{"issue":"11","key":"10065_CR8","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1109\/TCSVT.2011.2106291","volume":"21","author":"Y-C Hou","year":"2011","unstructured":"Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with\n                    unexpanded shares. IEEE Trans Circuits Syst Video Technol\n                    21(11):1760\u20131764","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10065_CR9","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.ins.2013.01.006","volume":"233","author":"Y-C Hou","year":"2013","unstructured":"Hou Y-C, Quan Z-Y, Tsai C-F, Tseng A-Y (2013) Block-based\n                    progressive visual secret sharing. Inf Sci 233:290\u2013304","journal-title":"Inf Sci"},{"issue":"2","key":"10065_CR10","first-page":"321","volume":"15","author":"Y-C Hou","year":"2018","unstructured":"Hou Y-C, Quan Z-Y, Tsai C-F (2018) Progressive visual cryptography\n                    with friendly and size invariant shares. Int Arab J Inf Technol\n                    15(2):321\u2013330","journal-title":"Int Arab J Inf Technol"},{"issue":"3","key":"10065_CR11","first-page":"350","volume":"2","author":"J Jesalkumari","year":"2013","unstructured":"Jesalkumari J, Sedamka RR (2013) Modified visual cryptography\n                    scheme for colored secret image sharing. Int J Comput Appl Technol Res\n                    2(3):350\u2013356","journal-title":"Int J Comput Appl Technol Res"},{"issue":"11","key":"10065_CR12","doi-asserted-by":"publisher","first-page":"2599","DOI":"10.1109\/TPAMI.2018.2865304","volume":"41","author":"W-S Lai","year":"2018","unstructured":"Lai W-S, Huang J-b, Ahuja N, Yang M-H (2018) Fast and accurate\n                    image super-resolution with deep laplacian pyramid networks. IEEE Trans Pattern\n                    Anal Mach Intell 41(11):2599\u20132613","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"10065_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F Liu","year":"2012","unstructured":"Liu F, Wu CK, Qian L (2012) Improving the visual quality of size\n                    invariant visual cryptography scheme. J Vis Commun Image Represent\n                    23(2):331\u2013342","journal-title":"J Vis Commun Image Represent"},{"key":"10065_CR14","doi-asserted-by":"crossref","unstructured":"Mayya V, Nayak A (2017) Parallel Implementation of Rotation Visual\n                    Cryptography on GPU using CUDA. International Conference on Advances in Image\n                    Processing ACM, pp 62\u201365","DOI":"10.1145\/3133264.3133280"},{"key":"10065_CR15","doi-asserted-by":"crossref","unstructured":"Mhala NC, Pais AR (2019) An Improved and Secure Visual Secret\n                    Sharing (VSS) scheme for Medical Images. In: 2019 11th International Conference\n                    on Communication Systems & Networks (COMSNETS). IEEE, pp\n                    823\u2013828","DOI":"10.1109\/COMSNETS.2019.8711327"},{"key":"10065_CR16","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.sigpro.2019.04.023","volume":"162","author":"NC Mhala","year":"2019","unstructured":"Mhala NC, Pais AR (2019) Contrast enhancement of progressive visual\n                    secret sharing (PVSS) scheme for gray-scale and color images using\n                    super-resolution. Signal Process 162:253\u2013267","journal-title":"Signal Process"},{"key":"10065_CR17","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-981-13-1927-3_18","volume-title":"Smart Intelligent Computing and Applications","author":"T Monoth","year":"2019","unstructured":"Monoth T (2019) Contrast-Enhanced Recursive Visual Cryptography\n                    Scheme Based on Additional Basis Matrices. In: Smart Intelligent Computing and\n                    Applications. Springer, Singapore, pp 179\u2013187"},{"key":"10065_CR18","unstructured":"Naphade, Khobaragade, Thakare (2015) Multiple share images using\n                    random grids and XOR-Based visual cryptography. IOSR J Comp Eng (IOSR-JCE) pp\n                    1\u20135"},{"key":"10065_CR19","doi-asserted-by":"crossref","unstructured":"Padiya I, Manure V, Vidhate A (2015) Visual secret sharing scheme\n                    using encrypting multiple images. Int J Adv Res Electr Electron Instrum\n                    Eng","DOI":"10.15662\/ijareeie.2015.0401013"},{"key":"10065_CR20","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.neucom.2019.10.076","volume":"379","author":"J Qin","year":"2020","unstructured":"Qin J, Huang Y, Wen W (2020) Multi-scale feature fusion residual\n                    network for single image super-resolution. Neurocomputing\n                    379:334\u2013342","journal-title":"Neurocomputing"},{"key":"10065_CR21","doi-asserted-by":"publisher","first-page":"105059","DOI":"10.1016\/j.cmpb.2019.105059","volume":"187","author":"D Qiu","year":"2020","unstructured":"Qiu D, Zhang S, Liu Y, Zhu J, Zheng L (2020) Super-resolution\n                    reconstruction of knee magnetic resonance imaging based on deep learning. Comput\n                    Methods Prog Biomed 187:105059","journal-title":"Comput Methods Prog Biomed"},{"key":"10065_CR22","doi-asserted-by":"crossref","unstructured":"Shi W, Caballero J, Husz\u00e1r F, Totz J, Aitken AP, Bishop R,\n                    Rueckert D, Wang Z (2016) Real-time single image and video super-resolution\n                    using an efficient sub-pixel convolutional neural network. In: Proceedings of\n                    the IEEE conference on computer vision and pattern recognition, pp\n                    1874\u20131883","DOI":"10.1109\/CVPR.2016.207"},{"key":"10065_CR23","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-981-10-8201-6_33","volume-title":"Innovations in Computer Science and Engineering","author":"S Srividhya","year":"2019","unstructured":"Srividhya S, Jayasree J, Sudha GF (2019) Error Diffusion with\n                    Varying Threshold Halftoning for Enhancing Contrast of Color Images. In:\n                    Innovations in Computer Science and Engineering. Springer, Singapore, pp\n                    289\u2013298"},{"key":"10065_CR24","doi-asserted-by":"crossref","unstructured":"Tong T, Li G, Liu X, Gao Q (2017) Image super-resolution using\n                    dense skip connections. In Proceedings of the IEEE International Conference on\n                    Computer Vision, pp 4799\u20134807","DOI":"10.1109\/ICCV.2017.514"},{"key":"10065_CR25","unstructured":"U. U. of Southern California (2016), USC-SIPI, 1977.\n                    http:\/\/sipi.usc.edu\/database\/database.php?volume=misc?\n                    [Online;Accessed19November 2016]"},{"key":"10065_CR26","doi-asserted-by":"crossref","unstructured":"Ulutas M (2010) Meaningful share generation for increased number of\n                    secrets in visual secret-sharing scheme. Mathematical Problems in Engineering\n                    2010","DOI":"10.1155\/2010\/593236"},{"key":"10065_CR27","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-55046-1_2","volume-title":"Transactions on Data Hiding and Multimedia Security IX","author":"Y Yamaguchi","year":"2014","unstructured":"Yamaguchi Y (2014) Extended visual cryptography scheme for\n                    multiple-secrets continuous-tone images. In: Transactions on Data Hiding and\n                    Multimedia Security IX. Springer, Berlin, pp 25\u201341"},{"issue":"18","key":"10065_CR28","doi-asserted-by":"publisher","first-page":"11157","DOI":"10.1007\/s11042-015-2838-4","volume":"75","author":"B Yan","year":"2016","unstructured":"Yan B, Wang Y-F, Song L-Y, Yang H-M (2016) Size-invariant extended\n                    visual cryptography with embedded watermark based on error diffusion. Multimed\n                    Tools Appl 75(18):11157\u201311180","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10065_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11554-015-0540-4","volume":"14","author":"X Yan","year":"2018","unstructured":"Yan X, Liu X, Yang C-N (2018) An enhanced threshold visual secret\n                    sharing based on random grids. J Real-Time Image Proc\n                    14(1):61\u201373","journal-title":"J Real-Time Image Proc"},{"issue":"1","key":"10065_CR30","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11554-018-0774-z","volume":"16","author":"Y Yuan","year":"2019","unstructured":"Yuan Y, Yang X, Wu W, Hu L, Liu Y, Liu K (2019) A fast single-image\n                    super-resolution method implemented with CUDA. J Real-Time Image Proc\n                    16(1):81\u201397","journal-title":"J Real-Time Image Proc"},{"issue":"1","key":"10065_CR31","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s10489-018-1270-7","volume":"49","author":"K Zeng","year":"2019","unstructured":"Zeng K, Ding S, Jia W (2019) Single image super-resolution using a\n                    polymorphic parallel CNN. Appl Intell 49(1):292\u2013300","journal-title":"Appl Intell"}],"updated-by":[{"DOI":"10.1007\/s11042-024-19929-8","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10065-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10065-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10065-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T04:07:16Z","timestamp":1722226036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10065-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10065"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10065-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"16 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-19929-8","URL":"https:\/\/doi.org\/10.1007\/s11042-024-19929-8","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}