{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:40:00Z","timestamp":1772908800742,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:00:00Z","timestamp":1611705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10352-3","type":"journal-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T14:02:51Z","timestamp":1611756171000},"page":"14609-14635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["XOR-based visual secret sharing scheme using pixel vectorization"],"prefix":"10.1007","volume":"80","author":[{"given":"Suresh Prasad","family":"Kannojia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9684-4237","authenticated-orcid":false,"given":"Jasvant","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"10352_CR1","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C Blundo","year":"2001","unstructured":"Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Designs Codes Crypto 24:255\u2013278","journal-title":"Designs Codes Crypto"},{"key":"10352_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo C, D\u2019Arco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discret Math 16:224\u2013261","journal-title":"SIAM J Discret Math"},{"key":"10352_CR3","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.displa.2017.05.004","volume":"49","author":"HC Chao","year":"2017","unstructured":"Chao HC, Fan TY (2017) XOR-Based progressive visual secret sharing using generalized random grids. Displays 49:6\u201315","journal-title":"Displays"},{"key":"10352_CR4","doi-asserted-by":"crossref","unstructured":"Chattopadhyay AK, Nag A, Singh JP, Singh AK (2020) A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimedia Tools Appl 1\u201330","DOI":"10.1007\/s11042-020-09174-0"},{"key":"10352_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ins.2011.11.026","volume":"189","author":"TH Chen","year":"2012","unstructured":"Chen TH, Li KC (2012) Multi-image encryption by circular random grids. Inf Sci 189:255\u2013265","journal-title":"Inf Sci"},{"key":"10352_CR6","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"TH Chen","year":"2011","unstructured":"Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Sys Softw 84:1197\u20131208","journal-title":"J Sys Softw"},{"key":"10352_CR7","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/TCSVT.2011.2133470","volume":"21","author":"TH Chen","year":"2011","unstructured":"Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Sys Video Technol 21:1693\u20131703","journal-title":"IEEE Trans Circ Sys Video Technol"},{"key":"10352_CR8","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1016\/j.sigpro.2012.02.015","volume":"92","author":"TH Chen","year":"2012","unstructured":"Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92:2229\u20132237","journal-title":"Signal Process"},{"key":"10352_CR9","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1109\/TIP.2012.2190082","volume":"21","author":"YC Chen","year":"2012","unstructured":"Chen YC, Horng G, Tsai DS (2012) Comment on \u201ccheating prevention in visual cryptography\u201d IEEE Trans Image Process 21:3319\u20133323","journal-title":"IEEE Trans Image Process"},{"key":"10352_CR10","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1016\/j.dsp.2013.05.014","volume":"23","author":"YC Chen","year":"2013","unstructured":"Chen YC, Tsai DS, Horng G (2013) Visual secret sharing with cheating prevention revisited. Digit Sig Process 23:1496\u20131504","journal-title":"Digit Sig Process"},{"key":"10352_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2005","unstructured":"Cimato S, De Prisco R, De Santis (2005) Probabilistic visual cryptography schemes. Comput J 49:97\u2013107","journal-title":"Comput J"},{"key":"10352_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","volume":"77","author":"M Deshmukh","year":"2018","unstructured":"Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multimedia Tools Appl 77:89\u2013107","journal-title":"Multimedia Tools Appl"},{"key":"10352_CR13","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1007\/s11042-018-6364-z","volume":"78","author":"Z Fu","year":"2019","unstructured":"Fu Z, Cheng Y, Yu B (2019) Perfect recovery of XOR-based visual cryptography scheme. Multimedia Tools Appl 78:2367\u20132384","journal-title":"Multimedia Tools Appl"},{"key":"10352_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.sigpro.2013.06.003","volume":"94","author":"T Guo","year":"2014","unstructured":"Guo T, Liu F, Wu C (2014) K out of k extended visual cryptography scheme by random grids. Signal Process 94:90\u2013101","journal-title":"Signal Process"},{"key":"10352_CR15","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T Hofmeister","year":"2000","unstructured":"Hofmeister T, Krause M, Simon HU (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor Comput Sci 240:471\u2013485","journal-title":"Theor Comput Sci"},{"key":"10352_CR16","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2006","unstructured":"Hu CM, Tzeng WG (2006) Cheating prevention in visual cryptography. IEEE Trans Image Process 16:36\u201345","journal-title":"IEEE Trans Image Process"},{"key":"10352_CR17","doi-asserted-by":"publisher","first-page":"8207","DOI":"10.1007\/s11042-018-6779-6","volume":"78","author":"X Jia","year":"2019","unstructured":"Jia X, Wang D, Chu Q, Chen Z (2019) An efficient XOR-based verifiable visual cryptographic scheme. Multimedia Tools Appl 78:8207\u20138223","journal-title":"Multimedia Tools Appl"},{"key":"10352_CR18","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12:377\u2013379","journal-title":"Opt Lett"},{"key":"10352_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10623-005-6700-y","volume":"40","author":"H Koga","year":"2006","unstructured":"Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Designs Codes Crypto 40:81\u2013102","journal-title":"Designs Codes Crypto"},{"key":"10352_CR20","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2011.09.015","volume":"92","author":"YS Lee","year":"2012","unstructured":"Lee YS, Chen TH (2012) Insight into collusion attacks in random-grid-based visual secret sharing. Signal Process 92:727\u2013736","journal-title":"Signal Process"},{"key":"10352_CR21","doi-asserted-by":"publisher","first-page":"2426","DOI":"10.1093\/comjnl\/bxu078","volume":"58","author":"C Lian","year":"2014","unstructured":"Lian C, Pang L, Liang J (2014) Generalized random grid-based visual secret sharing for general access structures. Comput J 58:2426\u20132442","journal-title":"Comput J"},{"key":"10352_CR22","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"CC Lin","year":"2004","unstructured":"Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Sys Softw 73:405\u2013414","journal-title":"J Sys Softw"},{"key":"10352_CR23","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1016\/j.jvcir.2014.06.011","volume":"25","author":"CH Lin","year":"2014","unstructured":"Lin CH, Chen TH, Wu YT, Tsao KH, Lin KS (2014) Multi-factor cheating prevention in visual secret sharing by hybrid codebooks. J Vis Commun Image Represent 25:1543\u20131557","journal-title":"J Vis Commun Image Represent"},{"key":"10352_CR24","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.jvcir.2015.08.018","volume":"33","author":"CH Lin","year":"2015","unstructured":"Lin CH, Lee YS, Chen TH (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31\u201341","journal-title":"J Vis Commun Image Represent"},{"key":"10352_CR25","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/TIFS.2011.2167229","volume":"7","author":"SJ Lin","year":"2011","unstructured":"Lin SJ, Chung WH (2011) A probabilistic model of (t,n) visual cryptography scheme with dynamic group. IEEE Trans Inf Foren Sec 7:197\u2013207","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"10352_CR26","doi-asserted-by":"crossref","unstructured":"Liu F, Wu C (2014) Optimal XOR based (2, n)-visual cryptography schemes. In: International workshop on digital watermarking, pp 333\u2013349","DOI":"10.1007\/978-3-319-19321-2_25"},{"key":"10352_CR27","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10623-008-9225-3","volume":"50","author":"F Liu","year":"2009","unstructured":"Liu F, Wu CK, Lin XJ (2009) The alignment problem of visual cryptography schemes. Designs Codes Crypto 50:215\u2013227","journal-title":"Designs Codes Crypto"},{"key":"10352_CR28","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"10352_CR29","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process 108:604\u2013621","journal-title":"Signal Process"},{"key":"10352_CR30","doi-asserted-by":"crossref","unstructured":"Pang L, Miao D, Lian C (2016) User-friendly random-grid-based visual secret sharing for general access structures, vol 9, pp 966\u2013976","DOI":"10.1002\/sec.1392"},{"key":"10352_CR31","doi-asserted-by":"crossref","unstructured":"Praveen K, Sethumadhavan M (2018) Cheating immune visual cryptographic scheme with reduced pixel expansion. In: Progress in advanced computing and intelligent engineering, pp 257\u2013265","DOI":"10.1007\/978-981-10-6872-0_24"},{"key":"10352_CR32","first-page":"245","volume":"19","author":"S Salehi","year":"2014","unstructured":"Salehi S, Balafar MA (2014) Visual multi secret sharing by cylindrical random grid. J Inf Sec Appl 19:245\u2013255","journal-title":"J Inf Sec Appl"},{"key":"10352_CR33","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"SJ Shyu","year":"2009","unstructured":"Shyu SJ (2009) Image encryption by multiple random grids. Patt Recogn 42:1582\u20131596","journal-title":"Patt Recogn"},{"key":"10352_CR34","doi-asserted-by":"crossref","unstructured":"Singh N (2018) XOR Encryption techniques of video steganography: a comparative analysis. In: International conference on intelligent systems design and applications, pp 203\u2013214","DOI":"10.1007\/978-3-030-16657-1_19"},{"key":"10352_CR35","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.sigpro.2017.06.015","volume":"142","author":"P Singh","year":"2018","unstructured":"Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301\u2013319","journal-title":"Signal Process"},{"key":"10352_CR36","doi-asserted-by":"publisher","first-page":"5719","DOI":"10.1007\/s11042-019-08351-0","volume":"79","author":"L Tan","year":"2020","unstructured":"Tan L, Lu Y, Yan X, Liu L, Zhou X (2020) XOR-Ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multimedia Tools Appl 79:5719\u20135741","journal-title":"Multimedia Tools Appl"},{"key":"10352_CR37","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"CC Thien","year":"2003","unstructured":"Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Trans Circ Sys Video Technol 13:1161\u20131169","journal-title":"IEEE Trans Circ Sys Video Technol"},{"key":"10352_CR38","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"DS Tsai","year":"2007","unstructured":"Tsai DS, Chen TH, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Patt Recogn 40:2356\u20132366","journal-title":"Patt Recogn"},{"key":"10352_CR39","unstructured":"Tuyls P et al (2002) A polarisation based visual crypto system and its secret sharing schemes. https:\/\/eprint.iacr.org\/2002\/194"},{"key":"10352_CR40","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"37","author":"P Tuyls","year":"2005","unstructured":"Tuyls P et al (2005) XOR-Based visual cryptography schemes. Designs Codes Crypto 37:169\u2013186","journal-title":"Designs Codes Crypto"},{"key":"10352_CR41","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.jvcir.2013.03.002","volume":"24","author":"X Wu","year":"2013","unstructured":"Wu X, Liu T, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing via error diffusion. J Vis Commun Image Represent 24:552\u2013566","journal-title":"J Vis Commun Image Represent"},{"key":"10352_CR42","doi-asserted-by":"crossref","unstructured":"Wu X, Ou D, Dai L, Sun W (2013) XOR-Based meaningful visual secret sharing by generalized random grids. In: Proceedings of the first ACM workshop on information hiding and multimedia security, pp 181\u2013190","DOI":"10.1145\/2482513.2482515"},{"key":"10352_CR43","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1016\/j.jss.2012.02.046","volume":"85","author":"X Wu","year":"2012","unstructured":"Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85:1852\u20131863","journal-title":"J Syst Softw"},{"key":"10352_CR44","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/j.jss.2011.12.041","volume":"85","author":"X Wu","year":"2012","unstructured":"Wu X, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Sys Softw 85:1119\u20131134","journal-title":"J Sys Softw"},{"key":"10352_CR45","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TIFS.2013.2274955","volume":"8","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Generalized random grid and its applications in visual cryptography. IEEE Trans Inf Foren Sec 8:1541\u20131553","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"10352_CR46","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93:977\u2013995","journal-title":"Signal Process"},{"key":"10352_CR47","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","volume":"24","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image Represent 24:48\u201362","journal-title":"J Vis Commun Image Represent"},{"key":"10352_CR48","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.sigpro.2013.10.023","volume":"97","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) Improved tagged visual cryptography by random grids. Signal Process 97:64\u201382","journal-title":"Signal Process"},{"key":"10352_CR49","doi-asserted-by":"publisher","first-page":"9279","DOI":"10.1007\/s11042-014-2080-5","volume":"74","author":"X Yan","year":"2015","unstructured":"Yan X, Wang S, El-Latif AAA, Niu X (2015) Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimedia Tools Appl 74:9279\u20139296","journal-title":"Multimedia Tools Appl"},{"key":"10352_CR50","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"CN Yang","year":"2007","unstructured":"Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Sys Softw 80:1070\u20131076","journal-title":"J Sys Softw"},{"key":"10352_CR51","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z Zhou","year":"2006","unstructured":"Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15:2441\u20132453","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10352-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10352-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10352-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T18:16:52Z","timestamp":1674929812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10352-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,27]]},"references-count":51,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10352"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10352-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,27]]},"assertion":[{"value":"12 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}