{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:45:19Z","timestamp":1761198319733,"version":"3.28.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T00:00:00Z","timestamp":1714867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T00:00:00Z","timestamp":1714867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11760-024-03154-9","type":"journal-article","created":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T13:01:36Z","timestamp":1714914096000},"page":"309-323","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography"],"prefix":"10.1007","volume":"18","author":[{"given":"Manoj","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shashi","family":"Shekhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,5]]},"reference":[{"issue":"5","key":"3154_CR1","doi-asserted-by":"publisher","first-page":"7449","DOI":"10.3233\/JIFS-222618","volume":"44","author":"D Shamia","year":"2023","unstructured":"Shamia, D., Balasamy, K., Suganyadevi, S.: A secure framework for medical image by integrating watermarking and encryption through fuzzy based ROI selection. J. Intell. Fuzzy Syst. 44(5), 7449\u20137457 (2023)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"3154_CR2","doi-asserted-by":"publisher","first-page":"7167","DOI":"10.1007\/s11042-020-09981-5","volume":"80","author":"K Balasamy","year":"2021","unstructured":"Balasamy, K., Suganyadevi, S.: A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed. Tools Appl. 80, 7167\u20137186 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"3154_CR3","first-page":"7","volume":"4","author":"M Karolin","year":"2015","unstructured":"Karolin, M., Meyyapan, D.T.: RGB based secret sharing scheme in color visual cryptography. Int. J. Adv. Res. Comput. Commun. Eng. 4, 7 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"10","key":"3154_CR4","first-page":"1","volume":"122","author":"K Balasamy","year":"2022","unstructured":"Balasamy, K., Krishnaraj, N., Vijayalakshmi, K.: An adaptive neuro-fuzzy based region selection and authenticating medical image through watermarking for secure communication. Wirel. Person. Commun. 122(10), 1\u201321 (2022)","journal-title":"Wirel. Person. Commun."},{"issue":"10","key":"3154_CR5","doi-asserted-by":"publisher","first-page":"14321","DOI":"10.1007\/s11042-022-12367-4","volume":"81","author":"K Balasamy","year":"2022","unstructured":"Balasamy, K., Krishnaraj, N., Vijayalakshmi, K.: Improving the security of medical image through neuro-fuzzy based ROI selection for reliable transmission. Multimed. Tools Appl. 81(10), 14321\u201314337 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"3154_CR6","doi-asserted-by":"crossref","unstructured":"Alex, N.S., Anbarasi, L.J.: Enhanced image secret sharing via error diffusion in halftone visual cryptography. In: 3rd International Conference on Electronics Computer Technology, vol. 2, pp. 393\u2013397 (2011)","DOI":"10.1109\/ICECTECH.2011.5941725"},{"key":"3154_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s13735-021-00218-1","volume":"11","author":"S Suganyadevi","year":"2022","unstructured":"Suganyadevi, S., Seethalakshmi, V., Balasamy, K.: A review on deep learning in medical image analysis. Int. J. Multimed. Inf. Retriev. 11, 19\u201338 (2022)","journal-title":"Int. J. Multimed. Inf. Retriev."},{"key":"3154_CR8","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-14298-7_5","volume":"8","author":"J Weir","year":"2010","unstructured":"Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. Data Hiding Multimed. Secur. 8, 70\u2013105 (2010)","journal-title":"Trans. Data Hiding Multimed. Secur."},{"key":"3154_CR9","first-page":"2817","volume":"122","author":"SS Suganyadevi","year":"2023","unstructured":"Suganyadevi, S.S., Seethalakshmi, V.: Deep recurrent learning based qualified sequence segment analytical model (QS2AM) for infectious disease detection using CT images. Evol. Syst. 122, 2817\u20132837 (2023)","journal-title":"Evol. Syst."},{"key":"3154_CR10","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1016\/j.procs.2016.02.103","volume":"78","author":"AV Dahat","year":"2016","unstructured":"Dahat, A.V., Chavan, P.V.: Secret sharing based visual cryptography scheme using CMY color space. Proc. Comput. Sci. 78, 563\u2013570 (2016)","journal-title":"Proc. Comput. Sci."},{"issue":"5","key":"3154_CR11","doi-asserted-by":"publisher","first-page":"7415","DOI":"10.3233\/JIFS-223242","volume":"45","author":"K Thangaraj","year":"2023","unstructured":"Thangaraj, K., Sakthivel, M., Balasamy, K., Suganyadevi, S.: Computer-aided cluster formation in wireless sensor networks using machine learning. J. Intell. Fuzzy Syst. 45(5), 7415\u20137428 (2023)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"3154_CR12","doi-asserted-by":"publisher","first-page":"3279","DOI":"10.1007\/s11277-022-09864-y","volume":"126","author":"S Suganyadevi","year":"2022","unstructured":"Suganyadevi, S., Seethalakshmi, V.: CVD-HNet: classifying pneumonia and COVID-19 in chest X-ray images using deep network. Wirel. Person. Commun. 126, 3279\u20133303 (2022)","journal-title":"Wirel. Person. Commun."},{"key":"3154_CR13","doi-asserted-by":"crossref","unstructured":"Pradeep, G., Bala, S., Satheesh, N.P., Mahalakshmi, M., Balasamy, K., Suganyadevi, S.: An effective framework for detecting epileptic seizures using CNN and encrypted EEG signals. In: The Proceedings of the International Conference on Sustainable Computing and Smart Systems (ICSCSS), pp. 611\u2013617 (2023)","DOI":"10.1109\/ICSCSS57650.2023.10169196"},{"issue":"2","key":"3154_CR14","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"key":"3154_CR15","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0167-8655(02)00259-3","volume":"24","author":"CC Lin","year":"2003","unstructured":"Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognit. Lett. 24, 349\u2013358 (2003)","journal-title":"Pattern Recognit. Lett."},{"key":"3154_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"3154_CR17","first-page":"303","volume":"10","author":"M Nakajima","year":"2002","unstructured":"Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. J. WSCG 10(2), 303\u2013310 (2002)","journal-title":"J. WSCG"},{"key":"3154_CR18","unstructured":"Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. In: Proceedings of IEEE International Conference in Image Processing, Barcelona, Spain (2003)"},{"issue":"1","key":"3154_CR19","first-page":"102","volume":"1","author":"S Mandal","year":"2014","unstructured":"Mandal, S., Das, S., Nath, A.: Data hiding and retrieval using visual cryptography. Int. J. Innov. Res. Adv. Eng. 1(1), 102\u2013110 (2014)","journal-title":"Int. J. Innov. Res. Adv. Eng."},{"issue":"3","key":"3154_CR20","first-page":"350","volume":"2","author":"A JoshiJesalkumari","year":"2013","unstructured":"JoshiJesalkumari, A., Sedamkar, R.R.: Modified visual cryptography scheme for colored secret image sharing. Int. J. Comput. Appl. Technol. Res. 2(3), 350\u2013356 (2013)","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"3154_CR21","doi-asserted-by":"publisher","first-page":"108122","DOI":"10.1016\/j.sigpro.2021.108122","volume":"186","author":"X Wu","year":"2021","unstructured":"Wu, X., Yao, P., An, N.: Extended XOR-based visual cryptography schemes by integer linear program. Signal Process. 186, 108122 (2021)","journal-title":"Signal Process."},{"issue":"7","key":"3154_CR22","first-page":"623","volume":"44","author":"DR Ibrahim","year":"2022","unstructured":"Ibrahim, D.R., Abdullah, R., Teh, J.S.: An enhanced color visual cryptography scheme based on the binary dragonfly algorithm. Int. J. Comput. Appl. 44(7), 623\u2013632 (2022)","journal-title":"Int. J. Comput. Appl."},{"issue":"21","key":"3154_CR23","doi-asserted-by":"publisher","first-page":"32023","DOI":"10.1007\/s11042-021-11202-6","volume":"80","author":"M Karolin","year":"2021","unstructured":"Karolin, M., Meyyappan, T.: Authentic secret share creation techniques using visual cryptography with public key encryption. Multimed. Tools Appl. 80(21), 32023\u201332040 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"3154_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/3287774","volume":"6","author":"L Ren","year":"2021","unstructured":"Ren, L.: A novel raster map exchange scheme based on visual cryptography. Adv. Multimed. 6, 1\u20137 (2021)","journal-title":"Adv. Multimed."},{"key":"3154_CR25","first-page":"32","volume":"8","author":"A Sherine","year":"2022","unstructured":"Sherine, A., Peter, G., Stonier, A.A., Praghash, K., Ganji, V.: CMY color spaced-based visual cryptography scheme for secret sharing of data. Wirel. Commun. Mob. Comput. 8, 32 (2022)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"3","key":"3154_CR26","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1080\/19393555.2020.1817633","volume":"30","author":"DR Ibrahim","year":"2021","unstructured":"Ibrahim, D.R., Teh, J.S., Abdullah, R.: Multifactor authentication system based on color visual cryptography, facial recognition, and dragonfly optimization. Inf. Secur. J. Glob. Perspect. 30(3), 149\u2013159 (2021)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"issue":"1","key":"3154_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s11554-016-0621-z","volume":"14","author":"P Li","year":"2018","unstructured":"Li, P., Yang, C.N., Kong, Q.: A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J. Real-Time Image Proc. 14(1), 41\u201350 (2018)","journal-title":"J. Real-Time Image Proc."},{"issue":"12","key":"3154_CR28","first-page":"695","volume":"12","author":"P Chouksey","year":"2021","unstructured":"Chouksey, P.: A secret share and key generation based visual cryptography approach for retaining 2D and 3D RGB color using transposition. J. Comput. Math. Educ. 12(12), 695\u2013708 (2021)","journal-title":"J. Comput. Math. Educ."},{"issue":"4","key":"3154_CR29","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.3390\/app10041321","volume":"10","author":"Y Guo","year":"2020","unstructured":"Guo, Y., Jia, X., Chu, Q., Wang, D.: A novel XOR-based threshold visual cryptography with adjustable pixel expansion. Appl. Sci. 10(4), 1321 (2020)","journal-title":"Appl. Sci."},{"key":"3154_CR30","doi-asserted-by":"publisher","first-page":"137","DOI":"10.2528\/PIER07092503","volume":"79","author":"AR Mallahzadeh","year":"2008","unstructured":"Mallahzadeh, A.R., Homayoon, O., Zahra, D.R.: Application of the invasive weed optimization technique for antenna configurations. Progress Electromag. Res. 79, 137\u2013150 (2008)","journal-title":"Progress Electromag. Res."},{"key":"3154_CR31","unstructured":"Klimov, P.V., Kelly, J., Martinis, J. M., Neven, H.: The snake optimizer for learning quantum processor control parameters (2020). arXiv preprint arXiv:2006.04594"},{"issue":"2","key":"3154_CR32","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16(2), 224\u2013261 (2003)","journal-title":"SIAM J. Discrete Math."},{"issue":"5","key":"3154_CR33","first-page":"733","volume":"24","author":"YC Hou","year":"2013","unstructured":"Hou, Y.C., Wei, S.C., Lin, C.Y.: Random-grid-based visual cryptography schemes. IEEE Trans. Circuits Syst. Video Technol. 24(5), 733\u2013744 (2013)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"3154_CR34","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.3390\/s22051869","volume":"22","author":"C Kielas-Jensen","year":"2022","unstructured":"Kielas-Jensen, C., Cichella, V., Berry, T., Kaminer, I., Walton, C., Pascoal, A.: Bernstein polynomial-based method for solving optimal trajectory generation problems. Sensors 22(5), 1869 (2022)","journal-title":"Sensors"},{"issue":"1","key":"3154_CR35","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ise2.12001","volume":"15","author":"K Bhat","year":"2021","unstructured":"Bhat, K., Uday Kumar Reddy, K.R., Mahto, D.: A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography. IET Inf. Secur. 15(1), 13\u201322 (2021)","journal-title":"IET Inf. Secur."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03154-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03154-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03154-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T01:51:09Z","timestamp":1731894669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03154-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,5]]},"references-count":35,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3154"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03154-9","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2024,5,5]]},"assertion":[{"value":"13 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}