{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:39:43Z","timestamp":1740145183094,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T00:00:00Z","timestamp":1711843200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T00:00:00Z","timestamp":1711843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["ZR2021MF050"],"award-info":[{"award-number":["ZR2021MF050"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"MOE (Ministry of Education in China) Project of Humanities and Social Sciences","award":["18YJAZH110"],"award-info":[{"award-number":["18YJAZH110"]}]},{"name":"National Statistics Science Project","award":["2021LY082"],"award-info":[{"award-number":["2021LY082"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11554-024-01449-1","type":"journal-article","created":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T08:01:16Z","timestamp":1711872076000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FPGA implementation of secret sharing for textured 3D mesh model based on texture vertex correlation"],"prefix":"10.1007","volume":"21","author":[{"given":"Zi-Ming","family":"Wu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Hong-Mei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhen-Zhen","family":"Ju","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,31]]},"reference":[{"key":"1449_CR1","doi-asserted-by":"publisher","unstructured":"Beugnon, S., van Rensburg, B.J., Amalou, N., Puech, W., Pedeboy, J.P.: A 3d visual security (3dvs) score to measure the visual security level of selectively encrypted 3d objects. Signal Process. Image Commun. 108, 116832 (2022). https:\/\/doi.org\/10.1016\/j.image.2022.116832. www.sciencedirect.com\/science\/article\/pii\/S0923596522001230","DOI":"10.1016\/j.image.2022.116832"},{"key":"1449_CR2","doi-asserted-by":"crossref","unstructured":"Blanton, M., Kang, A., Yuan, C.: Improved building blocks for secure multi-party computation based on secret sharing with honest majority. In: Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19\u201322, 2020, Proceedings, Part I 18, 377\u2013397. Springer (2020)","DOI":"10.1007\/978-3-030-57808-4_19"},{"issue":"11s","key":"1449_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3512344","volume":"54","author":"A Chandramouli","year":"2022","unstructured":"Chandramouli, A., Choudhury, A., Patra, A.: A survey on perfectly secure verifiable secret-sharing. ACM Comput. Surv. (CSUR) 54(11s), 1\u201336 (2022). https:\/\/doi.org\/10.1145\/3512344","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1449_CR4","doi-asserted-by":"publisher","unstructured":"Chattopadhyay, A.K., Saha, S., Nag, A., Nandi, S.: Secret sharing: a comprehensive survey, taxonomy and applications. Comput. Sci. Rev. 51, 100608 (2024). https:\/\/doi.org\/10.1016\/j.cosrev.2023.100608. www.sciencedirect.com\/science\/article\/pii\/S1574013723000758","DOI":"10.1016\/j.cosrev.2023.100608"},{"key":"1449_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.jvcir.2017.09.013","volume":"49","author":"M Deshmukh","year":"2017","unstructured":"Deshmukh, M., Nain, N., Ahmed, M.: A novel approach for sharing multiple color images by employing Chinese remainder theorem. J. Visual Commun. Image Represent. 49, 291\u2013302 (2017). https:\/\/doi.org\/10.1016\/j.jvcir.2017.09.013","journal-title":"J. Visual Commun. Image Represent."},{"issue":"11","key":"1449_CR6","doi-asserted-by":"publisher","first-page":"13906","DOI":"10.1016\/j.eswa.2011.04.197","volume":"38","author":"E Elsheh","year":"2011","unstructured":"Elsheh, E., Hamza, A.B.: Secret sharing approaches for 3D object encryption. Expert Syst. Appl. 38(11), 13906\u201313911 (2011). https:\/\/doi.org\/10.1016\/j.eswa.2011.04.197","journal-title":"Expert Syst. Appl."},{"key":"1449_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103142","volume":"128","author":"C Gao","year":"2023","unstructured":"Gao, C., Yu, J.: Securerc: a system for privacy-preserving relation classification using secure multi-party computation. Comput. Secur. 128, 103142 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103142","journal-title":"Comput. Secur."},{"issue":"9","key":"1449_CR8","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.ipl.2014.04.006","volume":"114","author":"L Harn","year":"2014","unstructured":"Harn, L., Fuyou, M.: Multilevel threshold secret sharing based on the Chinese remainder theorem. Inform. Process. Lett. 114(9), 504\u2013509 (2014). https:\/\/doi.org\/10.1016\/j.ipl.2014.04.006","journal-title":"Inform. Process. Lett."},{"key":"1449_CR9","doi-asserted-by":"publisher","first-page":"76794","DOI":"10.1109\/ACCESS.2022.3192645","volume":"10","author":"K Iwamura","year":"2022","unstructured":"Iwamura, K., Kamal, A.A.A.M.: Simple approach to realizing verifiable secret sharing for secure cloud system. IEEE Access 10, 76794\u201376804 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3192645","journal-title":"IEEE Access"},{"issue":"1","key":"1449_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11042-015-3032-4","volume":"76","author":"SS Lee","year":"2017","unstructured":"Lee, S.S., Huang, Y.J., Lin, J.C.: Protection of 3D models using cross recovery. Multimed. Tools Appl. 76(1), 243\u2013264 (2017). https:\/\/doi.org\/10.1007\/s11042-015-3032-4","journal-title":"Multimed. Tools Appl."},{"key":"1449_CR11","doi-asserted-by":"publisher","unstructured":"Liu, T., Yan, B., Pan, J.S.: Color visual secret sharing for QR code with perfect module reconstruction. Appl. Sci. 9 (2019). https:\/\/doi.org\/10.3390\/app9214670","DOI":"10.3390\/app9214670"},{"key":"1449_CR12","doi-asserted-by":"publisher","unstructured":"Luo, T., Li, L., Zhang, S., Wang, S., Gu, W.: A novel reversible data hiding method for 3D model in homomorphic encryption domain. Multidiscip. Digit. Publish. Inst. (6) (2021). https:\/\/doi.org\/10.3390\/sym13061090","DOI":"10.3390\/sym13061090"},{"key":"1449_CR13","doi-asserted-by":"publisher","unstructured":"Melanson, D., Maia, R., Kim, H.S., Nascimento, A., De\u00a0Cock, M.: Secure multi-party computation for personalized human activity recognition. Neural Process. Lett., 1\u201327 (2023). https:\/\/doi.org\/10.1007\/s11063-023-11182-8","DOI":"10.1007\/s11063-023-11182-8"},{"key":"1449_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.104049","volume":"97","author":"JS Pan","year":"2021","unstructured":"Pan, J.S., Sun, X.X., Chu, S.C., Abraham, A., Yan, B.: Digital watermarking with improved SMS applied for QR code. Eng. Appl. Artif. Intell. 97, 104049 (2021). https:\/\/doi.org\/10.1016\/j.engappai.2020.104049","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1449_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103405","volume":"82","author":"JS Pan","year":"2022","unstructured":"Pan, J.S., Liu, T., Yang, H.M., Yan, B., Chu, S.C., Zhu, T.: Visual cryptography scheme for secret color images with color QR codes. J. Vis. Commun. Image Represent. 82, 103405 (2022). https:\/\/doi.org\/10.1016\/j.jvcir.2021.103405","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1449_CR16","doi-asserted-by":"publisher","unstructured":"Patel, R., Wolfe, P.F., Munafo, R., Varia, M., Herbordt, M.: Arithmetic and boolean secret sharing MPC on FPGAs in the data center. In: 2020 IEEE High Performance Extreme Computing Conference (HPEC), 1\u20138. IEEE (2020). https:\/\/doi.org\/10.1109\/hpec43674.2020.9286159","DOI":"10.1109\/hpec43674.2020.9286159"},{"issue":"4","key":"1449_CR17","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TCSVT.2021.3091319","volume":"32","author":"C Qin","year":"2022","unstructured":"Qin, C., Jiang, C., Mo, Q., Yao, H., Chang, C.C.: Reversible data hiding in encrypted image via secret sharing based on GF (p) and GF ($$2^{8}$$). IEEE Trans. Circ. Syst. Video Technol. 32(4), 1928\u20131941 (2022). https:\/\/doi.org\/10.1109\/TCSVT.2021.3091319","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"1449_CR18","doi-asserted-by":"publisher","unstructured":"Secret image sharing scheme with lossless recovery and high efficiency. Signal Processing 206, 108931 (2023). https:\/\/doi.org\/10.1016\/j.sigpro.2023.108931. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165168423000051","DOI":"10.1016\/j.sigpro.2023.108931"},{"issue":"11","key":"1449_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"1449_CR20","doi-asserted-by":"publisher","first-page":"9511","DOI":"10.1109\/ACCESS.2023.3240202","volume":"11","author":"BK Sharobim","year":"2023","unstructured":"Sharobim, B.K., Fetteha, M.A., Abd-El-Hafiz, S.K., Sayed, W.S., Said, L.A., Radwan, A.G.: An efficient multi-secret image sharing system based on Chinese remainder theorem and its fpga realization. IEEE Access 11, 9511\u20139520 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3240202","journal-title":"IEEE Access"},{"key":"1449_CR21","doi-asserted-by":"crossref","unstructured":"Stangl, J., Lor\u00fcnser, T., Dinakarrao, S.M.P.: A fast and resource efficient FPGA implementation of secret sharing for storage applications. In: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 654\u2013659. IEEE (2018)","DOI":"10.23919\/DATE.2018.8342091"},{"key":"1449_CR22","unstructured":"Textured 3D mesh model experimental results. (2023). https:\/\/github.com\/1184745459\/textured-3D-mesh-model"},{"issue":"2","key":"1449_CR23","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1049\/iet-ifs.2012.0064","volume":"7","author":"Y Tian","year":"2013","unstructured":"Tian, Y., Ma, J., Peng, C., Jiang, Q.: Fair (t, n) threshold secret sharing scheme. IET Inform. Secur. 7(2), 106\u2013112 (2013). https:\/\/doi.org\/10.1049\/iet-ifs.2012.0064","journal-title":"IET Inform. Secur."},{"issue":"1","key":"1449_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-015-0078-z","volume":"7","author":"YY Tsai","year":"2016","unstructured":"Tsai, Y.Y.: A secret 3D model sharing scheme with reversible data hiding based on space subdivision. 3d Res. 7(1), 1\u201314 (2016)","journal-title":"3d Res."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01449-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-024-01449-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01449-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T08:32:32Z","timestamp":1717662752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-024-01449-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,31]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1449"],"URL":"https:\/\/doi.org\/10.1007\/s11554-024-01449-1","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2024,3,31]]},"assertion":[{"value":"17 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"66"}}