{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:52:45Z","timestamp":1761663165272},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,4,12]],"date-time":"2013-04-12T00:00:00Z","timestamp":1365724800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s11760-013-0465-y","type":"journal-article","created":{"date-parts":[[2013,4,11]],"date-time":"2013-04-11T08:18:25Z","timestamp":1365668305000},"page":"499-510","source":"Crossref","is-referenced-by-count":26,"title":["New approaches for efficient information hiding-based secret image sharing schemes"],"prefix":"10.1007","volume":"9","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,12]]},"reference":[{"key":"465_CR1","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptography, Eurocrypt\u201994, Italy, May 9\u201312, pp. 1\u201312 (1994)","DOI":"10.1007\/BFb0053419"},{"key":"465_CR2","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Transactions on DHMS V, LNCS 6010, pp. 70\u2013105 (2010)","DOI":"10.1007\/978-3-642-14298-7_5"},{"issue":"1","key":"465_CR3","first-page":"74","volume":"31","author":"X-T Wu","year":"2011","unstructured":"Wu, X.-T., Sun, W.: Image sharing scheme based on error diffusion. J. Comput. Appl. 31(1), 74\u201381 (2011)","journal-title":"J. Comput. Appl."},{"issue":"13","key":"465_CR4","doi-asserted-by":"crossref","first-page":"275","DOI":"10.4156\/jdcta.vol6.issue13.30","volume":"6","author":"L Li","year":"2012","unstructured":"Li, L., Yan, X., Wang, N., Abd El-Latif, A.A., Niu, X.: Meaningful image sharing threshold scheme based on error diffusion. Int. J. Digit. Content Technol. Appl. (JDCTA) 6(13), 275\u2013284 (2012)","journal-title":"Int. J. Digit. Content Technol. Appl. (JDCTA)"},{"issue":"3","key":"465_CR5","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.jss.2004.07.250","volume":"76","author":"BJ Feng","year":"2005","unstructured":"Feng, B.J., Wu, H.C., Tsai, C.S., et al.: A new multi-secret images sharing scheme using Lagrange\u2019s interpolation [J]. J. Syst. Softw. 76(3), 327\u2013339 (2005)","journal-title":"J. Syst. Softw."},{"issue":"5","key":"465_CR6","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph 26(5), 765\u2013770 (2002)","journal-title":"Comput. Graph"},{"issue":"12","key":"465_CR7","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"CC Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161\u20131169 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"465_CR8","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.csi.2007.10.012","volume":"31","author":"R Zhao","year":"2009","unstructured":"Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252\u2013257 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"465_CR9","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography [J]. Theor. Comput. Sci. 250(1\/2), 143\u2013161 (2001)","DOI":"10.1016\/S0304-3975(99)00127-9"},{"key":"465_CR10","unstructured":"Yang, C.: New visual secret sharing schemes using probabilistic method [J]. Pattern Recognit. Lett. 25(4), 481\u2013494 (2004)"},{"issue":"8","key":"465_CR11","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441\u20132453 (2006)","journal-title":"IEEE Trans. Image Process."},{"key":"465_CR12","doi-asserted-by":"crossref","unstructured":"Myodo, E., Sakazawa, S., Takishima, Y.: Visual cryptography based on void and cluster halftoning technique. In: ICIP, Atlanta, GA, USA, Oct. 8-11, pp. 97\u2013100 (2006)","DOI":"10.1109\/ICIP.2006.312371"},{"key":"465_CR13","doi-asserted-by":"crossref","unstructured":"Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: ICME, Beijing, China, July 2\u20135, pp. 2114\u20132117 (2007)","DOI":"10.1109\/ICME.2007.4285100"},{"key":"465_CR14","doi-asserted-by":"crossref","unstructured":"Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, Atlanta, GA, USA, Oct. 8-11, pp. 109\u2013112 (2006)","DOI":"10.1109\/ICIP.2006.312384"},{"issue":"10","key":"465_CR15","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D-S Wang","year":"2007","unstructured":"Wang, D.-S., Zhang, L., Ning, M.A., et al.: Two secret sharing schemes based on Boolean operations [J]. Pattern Recognit. 40(10), 2776\u20132785 (2007)","journal-title":"Pattern Recognit."},{"issue":"1","key":"465_CR16","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/30.826391","volume":"46","author":"X-M Niu","year":"2000","unstructured":"Niu, X.-M., Lu, Z.-M.: Digital watermarking of still image with grag-scale digital water marks. IEEE Trans. Consumer Electron. 46(1), 137\u2013145 (2000)","journal-title":"IEEE Trans. Consumer Electron."},{"key":"465_CR17","doi-asserted-by":"crossref","first-page":"1852","DOI":"10.1016\/j.jss.2012.02.046","volume":"85","author":"X Wu","year":"2012","unstructured":"Wu, X., Ou, D., Liang, Q., Sun, W.: A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 85, 1852\u20131863 (2012)","journal-title":"J. Syst. Softw."},{"key":"465_CR18","first-page":"77","volume":"18","author":"M Liu","year":"2004","unstructured":"Liu, M., Huang, W.-J., Niu, X.-M.: The hiding information technology in video. J. Test Meas. Technol. 18, 77\u201380 (2004)","journal-title":"J. Test Meas. Technol."},{"key":"465_CR19","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2007.08.007","volume":"178","author":"Q Liu","year":"2008","unstructured":"Liu, Q., Sung, A.H.: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178, 21\u201336 (2008)","journal-title":"Inf. Sci."},{"key":"465_CR20","unstructured":"van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark [J]. In: Proceeding ICIP [C], Austin, Texas, USA, November 13\u201316 (1994)"},{"key":"465_CR21","doi-asserted-by":"crossref","unstructured":"Sharp, T.: An implementation of key-based digital signal steganography [C]. In: Proceedings of the 4th International Workshop on Information Hiding, vol. 2137, pp. 13\u201326. IEEE Press, Pittsburgh (2001)","DOI":"10.1007\/3-540-45496-9_2"},{"key":"465_CR22","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1016\/j.patrec.2012.04.010","volume":"33","author":"C Guo","year":"2012","unstructured":"Guo, C., Chang, C.-C., Qin, C.: A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit. Lett. 33, 1594\u20131600 (2012)","journal-title":"Pattern Recognit. Lett."},{"key":"465_CR23","unstructured":"NIST\/SEMATECH e-Handbook of Statistical Methods. http:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/eda3652.htm"},{"issue":"2","key":"465_CR24","first-page":"118","volume":"4","author":"X Yan","year":"2013","unstructured":"Yan, X., Wang, S., Li, L., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. J. Inf. Hiding Multimedia Signal Process. (JIHMSP) 4(2), 118\u2013126 (2013)","journal-title":"J. Inf. Hiding Multimedia Signal Process. (JIHMSP)"},{"issue":"1","key":"465_CR25","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"CT Hsu","year":"1999","unstructured":"Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58\u201368 (1999)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"465_CR26","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.patcog.2004.10.001","volume":"38","author":"WY Chen","year":"2005","unstructured":"Chen, W.Y., Chen, C.H.: A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognit. 38(4), 587\u2013598 (2005)","journal-title":"Pattern Recognit."},{"key":"465_CR27","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1117\/12.344672","volume":"3657","author":"M Kutter","year":"1999","unstructured":"Kutter, M., Petiteolas, F.: A fair benchnlark for image watermarking systems[J]. SPIE Secur. Watermarking Multimedia Contents 3657, 226\u2013239 (1999)","journal-title":"SPIE Secur. Watermarking Multimedia Contents"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-013-0465-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-013-0465-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-013-0465-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T12:10:44Z","timestamp":1562933444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-013-0465-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,12]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["465"],"URL":"https:\/\/doi.org\/10.1007\/s11760-013-0465-y","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,12]]}}}