{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:49Z","timestamp":1765622509673,"version":"3.48.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02099-1","type":"journal-article","created":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T02:22:30Z","timestamp":1758334950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["(k, n) Threshold Secret Image Sharing using linear algebra for secure multimedia transmission"],"prefix":"10.1007","volume":"18","author":[{"given":"Maroti","family":"Deshmukh","sequence":"first","affiliation":[]},{"given":"Arjun","family":"Singh Rawat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,20]]},"reference":[{"issue":"11","key":"2099_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Communications of the ACM 22(11):612\u2013613","journal-title":"Communications of the ACM"},{"key":"2099_CR2","doi-asserted-by":"crossref","unstructured":"Bai L, Biswas S, Ortiz A, Dalessandro D (2006) An image secret sharing method. In: 9th International conference on information fusion, pp 1\u20136, IEEE","DOI":"10.1109\/ICIF.2006.301805"},{"issue":"5","key":"2099_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCE.2017.2716412","volume":"7","author":"M Rajput","year":"2018","unstructured":"Rajput M, Deshmukh M, Nain N, Ahmed M (2018) Securing data through steganography and secret sharing schemes: trapping and misleading potential attackers. IEEE Consumer Electr Mag 7(5):40\u201345","journal-title":"IEEE Consumer Electr Mag"},{"key":"2099_CR4","first-page":"3848","volume":"15","author":"X Yan","year":"2020","unstructured":"Yan X et al (2020) Reversible image secret sharing. IEEE Transactions on Information Forensics and Secur 15:3848\u20133858","journal-title":"IEEE Transactions on Information Forensics and Secur"},{"key":"2099_CR5","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. International Workshop on Managing Requirements Knowledge (MARK), pp 313\u2013318 IEEE","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"3","key":"2099_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.jss.2004.07.250","volume":"76","author":"J-B Feng","year":"2005","unstructured":"Feng J-B et al (2005) A new multi-secret images sharing scheme using Largrange\u2019s interpolation. J Syst Soft 76(3):327\u2013339","journal-title":"J Syst Soft"},{"issue":"5","key":"2099_CR7","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C-C Thien","year":"2002","unstructured":"Thien C-C, Lin J-C (2002) Secret image sharing. Computers & Graphics 26(5):765\u2013770","journal-title":"Computers & Graphics"},{"issue":"15","key":"2099_CR8","doi-asserted-by":"publisher","first-page":"21291","DOI":"10.1007\/s11042-019-7455-1","volume":"78","author":"S Liu","year":"2019","unstructured":"Liu S, Fu Z, Yu B (2019) A two-level QR code scheme based on polynomial secret sharing. Multimed Tools Appl 78(15):21291\u201321308","journal-title":"Multimed Tools Appl"},{"key":"2099_CR9","doi-asserted-by":"crossref","unstructured":"Shi R, Zhong H, Huang L, Luo Y (2008) A (t, n) secret sharing scheme for image encryption. Congress on Image and Signal Process 3:3-6. IEEE","DOI":"10.1109\/CISP.2008.504"},{"key":"2099_CR10","doi-asserted-by":"crossref","unstructured":"Kalai Selvi A, Mohamed Sathik M (2010) Secret sharing scheme for image encryption using new transformation matrix. Information and Communication Technologies, pp 647\u2013650, Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-15766-0_113"},{"issue":"3","key":"2099_CR11","first-page":"37","volume":"5","author":"A Kalai Selvi","year":"2012","unstructured":"Kalai Selvi A, Mohamed Sathik M (2012) Secret sharing scheme for image encryption based on primitive root theorem. Int J Control Autom 5(3):37\u201346","journal-title":"Int J Control Autom"},{"issue":"7","key":"2099_CR12","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"CN Yang","year":"2007","unstructured":"Yang CN, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Soft 80(7):1070\u20131076","journal-title":"J Syst Soft"},{"issue":"2","key":"2099_CR13","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth C, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inf Theory 29(2):208\u2013210","journal-title":"IEEE Trans Inf Theory"},{"key":"2099_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.jvcir.2017.09.013","volume":"49","author":"M Deshmukh","year":"2017","unstructured":"Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291\u2013302","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"2099_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.4018\/IJDCF.2018040107","volume":"10","author":"W Ding","year":"2018","unstructured":"Ding W, Liu K, Yan X, Liu L (2018) Polynomial-based secret image sharing scheme with fully lossless reconstruction. International Journal of Digital Crime and Forensics (IJDCF) 10(2):120\u2013136","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"issue":"7","key":"2099_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym10070249","volume":"10","author":"X Zhou","year":"2018","unstructured":"Zhou X, Lu Y, Yan X, Wang Y, Liu L (2018) Lossless and efficient polynomial based secret image sharing with reduced shadow size. Symmetry 10(7):1\u201316","journal-title":"Symmetry"},{"key":"2099_CR17","doi-asserted-by":"publisher","first-page":"113216","DOI":"10.1109\/ACCESS.2019.2934999","volume":"7","author":"Q Gong","year":"2019","unstructured":"Gong Q, Wang Y, Yan X, Liu L (2019) Efficient and lossless polynomial-based secret image sharing for color images. IEEE Access 7:113216\u2013113222","journal-title":"IEEE Access"},{"key":"2099_CR18","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.ins.2014.07.016","volume":"288","author":"K-S Lin","year":"2014","unstructured":"Lin K-S, Lin C-H, Chen T-H (2014) Distortionless visual multi-secret sharing based on random grid. Inf Sci 288:330\u2013346","journal-title":"Inf Sci"},{"issue":"9","key":"2099_CR19","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1016\/j.sigpro.2012.02.015","volume":"92","author":"T-H Chen","year":"2012","unstructured":"Chen T-H, Tsao K-H, Lee Y-S (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92(9):2229\u20132237","journal-title":"Signal Process"},{"key":"2099_CR20","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ins.2011.11.026","volume":"189","author":"T-H Chen","year":"2012","unstructured":"Chen T-H, Li K-C (2012) Multi-image encryption by circular random grids. Inf Sci 189:255\u2013265","journal-title":"Inf Sci"},{"issue":"11","key":"2099_CR21","doi-asserted-by":"publisher","first-page":"7705","DOI":"10.1007\/s11042-019-08436-w","volume":"79","author":"B-Y Huang","year":"2020","unstructured":"Huang B-Y, Juan JST (2020) Flexible meaningful visual multi-secret sharing scheme by random grids. Multimed Tools Appl 79(11):7705\u20137729","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"2099_CR22","doi-asserted-by":"publisher","first-page":"12055","DOI":"10.1007\/s11042-018-6738-2","volume":"78","author":"Hao Hu","year":"2019","unstructured":"Hu Hao et al (2019) Improved schemes for visual secret sharing based on random grids. MultimedTools Appl 78(9):12055\u201312082","journal-title":"MultimedTools Appl"},{"key":"2099_CR23","doi-asserted-by":"crossref","unstructured":"Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using boolean XOR and modular arithmetic. IEEE Computer Society, AINA, pp 690\u2013697","DOI":"10.1109\/AINA.2016.56"},{"issue":"1","key":"2099_CR24","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","volume":"77","author":"M Deshmukh","year":"2018","unstructured":"Deshmukh M, Nain N, Ahmed M (2018) Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo. Multimed Tools Appl 77(1):89\u2013107","journal-title":"Multimed Tools Appl"},{"key":"2099_CR25","first-page":"267","volume":"47","author":"YK Meghrajani","year":"2019","unstructured":"Meghrajani YK, Desai LS, Mazumdar HS (2019) Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. J Inf Secur Appl 47:267\u2013274","journal-title":"J Inf Secur Appl"},{"key":"2099_CR26","first-page":"45","volume":"33","author":"C-Ch Chen","year":"2017","unstructured":"Chen C-Ch, Chen J-L (2017) A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45\u201354","journal-title":"J Inf Secur Appl"},{"key":"2099_CR27","first-page":"16","volume":"47","author":"S Kabirirad","year":"2019","unstructured":"Kabirirad S, Eslami Z (2019) Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. J Inf Secur Appl 47:16\u201327","journal-title":"J Inf Secur Appl"},{"key":"2099_CR28","first-page":"1","volume":"185","author":"X Lizhi","year":"2020","unstructured":"Lizhi X, Han X, Yang C-N (2020) CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Processing 185:1\u201315","journal-title":"Signal Processing"},{"key":"2099_CR29","doi-asserted-by":"crossref","unstructured":"Shankar K, Shankar K, et al (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humanized Comput pp 1\u201313","DOI":"10.1007\/s12652-018-1161-0"},{"key":"2099_CR30","doi-asserted-by":"crossref","unstructured":"Chen T-H, Tsao K-H, Wei K-C (2008) Multiple-image encryption by rotating random grids. Eighth Int Conf Intell Syst Des Appl 3:252\u2013256. IEEE","DOI":"10.1109\/ISDA.2008.141"},{"issue":"19","key":"2099_CR31","doi-asserted-by":"publisher","first-page":"28731","DOI":"10.1007\/s11042-021-11104-7","volume":"80","author":"Weitong Hu","year":"2021","unstructured":"Hu Weitong et al (2021) A lossless secret image sharing scheme using a larger finite field. Multimed Tools Appl 80(19):28731\u201328743","journal-title":"Multimed Tools Appl"},{"key":"2099_CR32","doi-asserted-by":"publisher","first-page":"35051","DOI":"10.1007\/s11042-020-09174-0","volume":"80","author":"AK Chattopadhyay","year":"2021","unstructured":"Chattopadhyay AK et al (2021) A verifiable multi-secret image sharing scheme using XOR operation and hash function. Multimed Tools Appl 80:35051\u201335080","journal-title":"Multimed Tools Appl"},{"key":"2099_CR33","doi-asserted-by":"crossref","unstructured":"Chen TH, Lee YS, Li CL (2010) High-capacity multi-secret sharing by random grid. In: International conference on broadband, wireless computing, communication and applications. IEEE, pp 459\u2013462","DOI":"10.1109\/BWCCA.2010.114"},{"issue":"12","key":"2099_CR34","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu SJ et al (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633\u20133651","journal-title":"Pattern Recogn"},{"issue":"3","key":"2099_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2030024","volume":"2","author":"J Chang","year":"2018","unstructured":"Chang J, Huang B-Y, Juan J (2018) A new visual multi-secrets sharing scheme by random grids. Cryptography 2(3):1\u201311","journal-title":"Cryptography"},{"issue":"13","key":"2099_CR36","doi-asserted-by":"publisher","first-page":"18653","DOI":"10.1007\/s11042-019-7205-4","volume":"78","author":"Y-X Liu","year":"2019","unstructured":"Liu Y-X et al (2019) Threshold changeable secret image sharing scheme based on interpolation polynomial. Multimed Tools Appl 78(13):18653\u201318667","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"2099_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym10100530","volume":"10","author":"W Ding","year":"2018","unstructured":"Ding W, Liu K, Yan X, Wang H, Liu L, Gong Q (2018) An image secret sharing method based on matrix theory. Symmetry 10(10):1\u201316","journal-title":"Symmetry"},{"issue":"9","key":"2099_CR38","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"T-H Chen","year":"2009","unstructured":"Chen T-H, Tsao K-H (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42(9):2203\u20132217","journal-title":"Pattern Recogn"},{"issue":"5","key":"2099_CR39","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1016\/j.jss.2012.12.022","volume":"86","author":"Tzung-Her Chen","year":"2013","unstructured":"Chen Tzung-Her et al (2013) Quality-adaptive visual secret sharing by random grids. J Syst Soft 86(5):1267\u20131274","journal-title":"J Syst Soft"},{"issue":"10","key":"2099_CR40","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"issue":"3","key":"2099_CR41","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1007\/s10115-018-1268-9","volume":"60","author":"M Deshmukh","year":"2019","unstructured":"Deshmukh M, Nain N, Ahmed M (2019) Secret sharing scheme based on binary trees and Boolean operation. Knowl Inf Syst 60(3):1377\u20131396","journal-title":"Knowl Inf Syst"},{"key":"2099_CR42","doi-asserted-by":"publisher","first-page":"12183","DOI":"10.1007\/s11042-019-08454-8","volume":"79","author":"M Gupta","year":"2020","unstructured":"Gupta M, Gupta M, Deshmukh M (2020) Single secret image sharing scheme using neural cryptography. Multimed Tools Appl 79:12183\u201312204","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"2099_CR43","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1007\/s11277-023-10315-5","volume":"130","author":"D Pande","year":"2023","unstructured":"Pande D et al (2023) Single secret sharing scheme using chinese remainder theorem, modified Shamir\u2019s scheme and XOR operation. Wireless Personal Commun 130(2):957\u2013985","journal-title":"Wireless Personal Commun"},{"key":"2099_CR44","doi-asserted-by":"crossref","unstructured":"Parihar B, Deshmukh M, Rawat AS (2024) A framework for counting based secret sharing scheme for images. Multimedia Tools and Applications, pp 1\u201334","DOI":"10.1007\/s11042-024-19749-w"},{"issue":"24","key":"2099_CR45","doi-asserted-by":"publisher","first-page":"34969","DOI":"10.1007\/s11042-021-10523-w","volume":"81","author":"AK Chattopadhyay","year":"2022","unstructured":"Chattopadhyay AK, Nag A, Singh JP (2022) An efficient verifiable (t, n)-threshold secret image sharing scheme with ultralight shares. Multimed Tools Appl 81(24):34969\u201334999","journal-title":"Multimed Tools Appl"},{"key":"2099_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102768","volume":"68","author":"MK Sardar","year":"2020","unstructured":"Sardar MK, Adhikari A (2020) A new lossless secret color image sharing scheme with small shadow size. J Vis Commun Image Represent 68:102768","journal-title":"J Vis Commun Image Represent"},{"issue":"5","key":"2099_CR47","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1109\/TNSE.2022.3177755","volume":"10","author":"J Wang","year":"2022","unstructured":"Wang J et al (2022) PCNN CEC: Efficient and privacy-preserving convolutional neural network inference based on cloud-edge-client collaboration. IEEE Trans Netw Sci Eng 10(5):2906\u20132923","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2099_CR48","doi-asserted-by":"crossref","unstructured":"Joshi B, et al (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing.\", Internation J Cloud Appl Comput (IJCAC) 12(1):1\u201311","DOI":"10.4018\/IJCAC.309936"},{"key":"2099_CR49","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.future.2022.06.016","volume":"137","author":"H Yang","year":"2022","unstructured":"Yang H et al (2022) A location-based privacy-preserving oblivious sharing scheme for indoor navigation. Future Gen Comput Syst 137:42\u201352","journal-title":"Future Gen Comput Syst"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02099-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02099-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02099-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:45Z","timestamp":1765622265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02099-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,20]]},"references-count":49,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2099"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02099-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,9,20]]},"assertion":[{"value":"30 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"283"}}