{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:00:11Z","timestamp":1709812811986},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T00:00:00Z","timestamp":1647216000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T00:00:00Z","timestamp":1647216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11042-022-12320-5","type":"journal-article","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T12:06:52Z","timestamp":1647259612000},"page":"35293-35316","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Boolean operation based lossless threshold secret image sharing"],"prefix":"10.1007","volume":"81","author":[{"given":"Aakash","family":"Paul","sequence":"first","affiliation":[]},{"given":"Shyamalendu","family":"Kandar","sequence":"additional","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,14]]},"reference":[{"issue":"19","key":"12320_CR1","doi-asserted-by":"publisher","first-page":"27569","DOI":"10.1007\/s11042-019-07852-2","volume":"78","author":"S Anwar","year":"2019","unstructured":"Anwar S, Meghana S (2019) A pixel permutation based image encryption technique using chaotic map. Multimed Tools Appl 78(19):27569\u201327590","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"12320_CR2","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1007\/s11227-019-02878-7","volume":"75","author":"A Arab","year":"2019","unstructured":"Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75(10):6663\u20136682","journal-title":"J Supercomput"},{"issue":"2","key":"12320_CR3","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth C, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inf Theory 29(2):208\u2013210","journal-title":"IEEE Trans Inf Theory"},{"key":"12320_CR4","doi-asserted-by":"crossref","unstructured":"Bai L (2006) A reliable (k, n) image secret sharing scheme. In: 2006 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31\u201336","DOI":"10.1109\/DASC.2006.11"},{"key":"12320_CR5","first-page":"16","volume":"33","author":"T Bhattacharjee","year":"2017","unstructured":"Bhattacharjee T, Rout RK, Maity SP (2017) Affine Boolean classification in secret image sharing for progressive quality access control. J Inf Secur Appl 33:16\u201329","journal-title":"J Inf Secur Appl"},{"key":"12320_CR6","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. In: International workshop on managing requirements knowledge (MARK). IEEE, pp 313\u2013318","DOI":"10.1109\/MARK.1979.8817296"},{"key":"12320_CR7","doi-asserted-by":"crossref","unstructured":"Biswas P, Kandar S, Dhara BC (2017) A novel image encryption technique using one dimensional chaotic map and circular shift technique. In: Proceedings of the 6th international conference on software and computer applications, pp 112\u2013116","DOI":"10.1145\/3056662.3056685"},{"issue":"43","key":"12320_CR8","doi-asserted-by":"publisher","first-page":"31715","DOI":"10.1007\/s11042-020-09497-y","volume":"79","author":"P Biswas","year":"2020","unstructured":"Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimed Tools Appl 79(43):31715\u201331738","journal-title":"Multimed Tools Appl"},{"key":"12320_CR9","doi-asserted-by":"crossref","unstructured":"Blesswin AJ, Visalakshi P (2013) An improved grayscale visual secret sharing scheme for visual information security. In: Fifth international conference on advanced computing (ICoAC). IEEE, pp 560\u2013564","DOI":"10.1109\/ICoAC.2013.6922012"},{"issue":"20","key":"12320_CR10","doi-asserted-by":"publisher","first-page":"27107","DOI":"10.1007\/s11042-018-5908-6","volume":"77","author":"YC Chen","year":"2018","unstructured":"Chen YC, Lee JS, Su HC (2018) Selective scalable secret image sharing with adaptive pixel-embedding technique. Multimed Tools Appl 77(20):27107\u201327121","journal-title":"Multimed Tools Appl"},{"key":"12320_CR11","doi-asserted-by":"crossref","unstructured":"Deepa AK, Bento B (2014) Embedded extended visual cryptography scheme for color image using ABC algorithm. In: 12th International conference on signal processing (ICSP). IEEE, pp 653\u2013657","DOI":"10.1109\/ICOSP.2014.7015084"},{"issue":"3","key":"12320_CR12","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1007\/s10115-018-1268-9","volume":"60","author":"M Deshmukh","year":"2019","unstructured":"Deshmukh M, Nain N, Ahmed M (2019) Secret sharing scheme based on binary trees and Boolean operation. Knowl Inf Syst 60(3):1377\u20131396","journal-title":"Knowl Inf Syst"},{"key":"12320_CR13","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1016\/j.compeleceng.2017.09.017","volume":"70","author":"K Dhiman","year":"2018","unstructured":"Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electr Eng 70:647\u2013658","journal-title":"Comput Electr Eng"},{"issue":"5","key":"12320_CR14","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1007\/s11432-011-4302-z","volume":"55","author":"L Dong","year":"2012","unstructured":"Dong L, Wang D, Li S, Dai Y (2012) (2, N) secret sharing scheme for gray and color images based on Boolean operation. Sci China Inf Sci 55 (5):1151\u20131161","journal-title":"Sci China Inf Sci"},{"key":"12320_CR15","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.optlaseng.2019.03.006","volume":"121","author":"L Gong","year":"2019","unstructured":"Gong L, Qiu K, Deng C, Zhou N (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169\u2013180","journal-title":"Opt Lasers Eng"},{"key":"12320_CR16","doi-asserted-by":"crossref","unstructured":"Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In: 20th International conference on pattern recognition. IEEE, pp 2366\u20132369","DOI":"10.1109\/ICPR.2010.579"},{"key":"12320_CR17","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/j.cnsns.2017.10.009","volume":"57","author":"Y Ji","year":"2018","unstructured":"Ji Y, Lai L, Zhong S, Zhang L (2018) Bifurcation and chaos of a new discrete fractional-order logistic map. Commun Nonlinear Sci Numer Simul 57:352\u2013358","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"12320_CR18","first-page":"117","volume":"44","author":"S Kandar","year":"2019","unstructured":"Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. J Inf Secur Appl 44:117\u2013129","journal-title":"J Inf Secur Appl"},{"key":"12320_CR19","doi-asserted-by":"crossref","unstructured":"Kalubandi VKP, Vaddi H, Ramineni V, Loganathan A (2016) A novel image encryption algorithm using AES and visual cryptography. In: 2nd International conference on next generation computing technologies (NGCT). IEEE, pp 808\u2013813","DOI":"10.1109\/NGCT.2016.7877521"},{"issue":"10","key":"12320_CR20","doi-asserted-by":"publisher","first-page":"14609","DOI":"10.1007\/s11042-020-10352-3","volume":"80","author":"SP Kannojia","year":"2021","unstructured":"Kannojia SP, Kumar J (2021) XOR-based visual secret sharing scheme using pixel vectorization. Multimed Tools Appl 80(10):14609\u201314635","journal-title":"Multimed Tools Appl"},{"key":"12320_CR21","doi-asserted-by":"publisher","first-page":"107326","DOI":"10.1016\/j.optlastec.2021.107326","volume":"143","author":"N Khalil","year":"2021","unstructured":"Khalil N, Sarhan A, Alshewimy MA (2021) An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps. Opt Laser Technol 143:107326","journal-title":"Opt Laser Technol"},{"key":"12320_CR22","unstructured":"Koikara R, Paul A, Yoo KY (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: International conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (worldcomp), pp 318\u2013320"},{"issue":"6","key":"12320_CR23","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.dsp.2011.07.004","volume":"21","author":"THN Le","year":"2011","unstructured":"Le THN, Lin CC, Chang CC, Le HB (2011) A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digit Signal Process 21(6):734\u2013745","journal-title":"Digit Signal Process"},{"issue":"1-2","key":"12320_CR24","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s11042-019-08077-z","volume":"79","author":"XS Li","year":"2020","unstructured":"Li XS, Chang CC, He MX, Lin CC (2020) A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix. Multimed Tools Appl 79(1-2):453\u2013476","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"12320_CR25","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1002\/sec.930","volume":"7","author":"YX Liu","year":"2014","unstructured":"Liu YX, Yang CN, Yeh PH (2014) Reducing shadow size in smooth scalable secret image sharing. Secur Commun Netw 7(12):2237\u20132244","journal-title":"Secur Commun Netw"},{"key":"12320_CR26","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.image.2018.05.004","volume":"66","author":"YX Liu","year":"2018","unstructured":"Liu YX, Yang CN, Wu SY, Chou YS (2018) Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process Image Commun 66:77\u201386","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"12320_CR27","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/LSP.2009.2038113","volume":"17","author":"YY Lin","year":"2009","unstructured":"Lin YY, Wang RZ (2009) Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 17(3):316\u2013319","journal-title":"IEEE Signal Process Lett"},{"issue":"6","key":"12320_CR28","doi-asserted-by":"publisher","first-page":"612","DOI":"10.3390\/math9060612","volume":"9","author":"CS Lin","year":"2021","unstructured":"Lin CS, Chen CC, Chen YC (2021) XOR-based progressively secret image sharing. Mathematics 9(6):612","journal-title":"Mathematics"},{"key":"12320_CR29","doi-asserted-by":"crossref","unstructured":"Loukhaoukha K, Chouinard JY, Berdai A (2012) A secure image encryption algorithm based on Rubik\u2019s cube principle. J Electr Comput Eng","DOI":"10.1155\/2012\/173931"},{"issue":"1","key":"12320_CR30","first-page":"14","volume":"27","author":"NEHA Merabet","year":"2018","unstructured":"Merabet NEHA, Benzid R (2018) Progressive image secret sharing scheme based on Boolean operations with perfect reconstruction capability. Inf Secur J: A Global Perspective 27(1):14\u201328","journal-title":"Inf Secur J: A Global Perspective"},{"issue":"2","key":"12320_CR31","first-page":"98","volume":"14","author":"A Nag","year":"2014","unstructured":"Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a boolean operation. Cybern Inf Technol 14(2):98\u2013113","journal-title":"Cybern Inf Technol"},{"key":"12320_CR32","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the theory and application of of cryptographic techniques. Springer, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"12320_CR33","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"12320_CR34","doi-asserted-by":"crossref","unstructured":"Patel T, Srivastava R (2016) A new technique for color share generation using visual cryptography. In: International conference on inventive computation technologies (ICICT). IEEE, pp 1\u20134","DOI":"10.1109\/INVENTIVE.2016.7824848"},{"key":"12320_CR35","first-page":"102470","volume":"52","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl 52:102470","journal-title":"J Inf Secur Appl"},{"issue":"17","key":"12320_CR36","doi-asserted-by":"publisher","first-page":"24837","DOI":"10.1007\/s11042-019-7710-5","volume":"78","author":"H Prasetyo","year":"2019","unstructured":"Prasetyo H, Hsia CH (2019) Lossless progressive secret sharing for grayscale and color images. Multimed Tools Appl 78(17):24837\u201324862","journal-title":"Multimed Tools Appl"},{"key":"12320_CR37","doi-asserted-by":"crossref","unstructured":"Prasetyo H, Rosiyadi D, Harjito B, Setiawan (2019) Bit plane slicing-based progressive visual secret sharing for grayscale and color images. In: International symposium on electronics and smart devices (ISESD). IEEE, pp 1\u20135","DOI":"10.1109\/ISESD.2019.8909613"},{"key":"12320_CR38","doi-asserted-by":"crossref","unstructured":"Roy R, Bandyopadhyay S, Kandar S, Dhara BC (2015) A novel 3\u20134 image secret sharing scheme. In: International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2072\u20132075","DOI":"10.1109\/ICACCI.2015.7275922"},{"issue":"18","key":"12320_CR39","doi-asserted-by":"publisher","first-page":"26073","DOI":"10.1007\/s11042-019-07766-z","volume":"78","author":"HR Shakir","year":"2019","unstructured":"Shakir HR (2019) An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling. Multimed Tools Appl 78 (18):26073\u201326087","journal-title":"Multimed Tools Appl"},{"key":"12320_CR40","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22:612\u2013613","journal-title":"Commun ACM"},{"issue":"5","key":"12320_CR41","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C-C Thien","year":"2002","unstructured":"Thien C -C, Lin J -C (2002) Secret image sharing. Comput Graph 26(5):765\u2013770","journal-title":"Comput Graph"},{"key":"12320_CR42","doi-asserted-by":"crossref","unstructured":"Thomas SA, Gharge S (2020) Halftone visual cryptography for color images using error diffusion and direct binary search. In: Emerging trends in photonics, signal processing and communication engineering. Springer, pp 99\u2013105","DOI":"10.1007\/978-981-15-3477-5_13"},{"issue":"7","key":"12320_CR43","doi-asserted-by":"publisher","first-page":"077001","DOI":"10.1117\/1.2955502","volume":"47","author":"HK Tso","year":"2008","unstructured":"Tso HK (2008) Sharing secret images using Blakley\u2019s concept. Opt Eng 47(7):077001","journal-title":"Opt Eng"},{"key":"12320_CR44","doi-asserted-by":"crossref","unstructured":"Ulutas M, Nabiyev VV, Ulutas G (2009) A new secret image sharing technique based on Asmuth Bloom\u2019s scheme. In: International conference on application of information and communication technologies. IEEE, pp 1\u20135","DOI":"10.1109\/ICAICT.2009.5372571"},{"key":"12320_CR45","doi-asserted-by":"crossref","unstructured":"Verma M, Rani R (2016) Strong threshold secret image sharing based on boolean operation. In: 2016 International conference on computing, communication and automation (ICCCA). IEEE, pp 1145\u20131149","DOI":"10.1109\/CCAA.2016.7813889"},{"issue":"2","key":"12320_CR46","first-page":"134","volume":"17","author":"M Verma","year":"2017","unstructured":"Verma M, Rani R (2017) Significant secret image sharing scheme based on boolean operation. Cybern Inf Technol 17(2):134\u2013150","journal-title":"Cybern Inf Technol"},{"issue":"6","key":"12320_CR47","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"RZ Wang","year":"2006","unstructured":"Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551\u2013555","journal-title":"Pattern Recogn Lett"},{"issue":"4","key":"12320_CR48","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.image.2006.12.012","volume":"22","author":"RZ Wang","year":"2007","unstructured":"Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363\u2013373","journal-title":"Signal Process Image Commun"},{"issue":"10","key":"12320_CR49","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"issue":"7","key":"12320_CR50","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1016\/j.jvcir.2010.06.001","volume":"21","author":"RZ Wang","year":"2010","unstructured":"Wang RZ, Chien YF, Lin YY (2010) Scalable user-friendly image sharing. J Vis Commun Image Represent 21(7):751\u2013761","journal-title":"J Vis Commun Image Represent"},{"key":"12320_CR51","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.optcom.2018.01.018","volume":"415","author":"Q Wang","year":"2018","unstructured":"Wang Q, Xiong D, Alfalou A, Brosseau C (2018) Optical image encryption method based on incoherent imaging and polarized light encoding. Opt Commun 415:56\u201363","journal-title":"Opt Commun"},{"key":"12320_CR52","doi-asserted-by":"publisher","first-page":"108064","DOI":"10.1016\/j.sigpro.2021.108064","volume":"185","author":"L Xiong","year":"2021","unstructured":"Xiong L, Han X, Yang CN (2021) CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Process 185:108064","journal-title":"Signal Process"},{"key":"12320_CR53","doi-asserted-by":"crossref","unstructured":"Yan X, Lu Y, Liu L, Wan S, Ding W, Liu H (2017) Chinese remainder theorem-based secret image sharing for (k, n) threshold. In: International conference on cloud computing and security. Springer, Cham, pp 433\u2013440","DOI":"10.1007\/978-3-319-68542-7_36"},{"issue":"9","key":"12320_CR54","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1016\/j.optcom.2009.12.077","volume":"283","author":"CN Yang","year":"2010","unstructured":"Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750\u20131762","journal-title":"Opt Commun"},{"issue":"10","key":"12320_CR55","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1016\/j.jss.2011.05.008","volume":"84","author":"CN Yang","year":"2011","unstructured":"Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726\u20131733","journal-title":"J Syst Softw"},{"key":"12320_CR56","doi-asserted-by":"publisher","first-page":"15021","DOI":"10.1109\/ACCESS.2018.2811722","volume":"6","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Yang CN, Cao Y, Sun X (2018) Secret image sharing based on encrypted pixels. IEEE Access 6:15021\u201315025","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12320-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12320-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12320-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T23:11:45Z","timestamp":1663888305000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12320-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,14]]},"references-count":56,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["12320"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12320-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,14]]},"assertion":[{"value":"14 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}