{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T11:49:36Z","timestamp":1773229776434,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T00:00:00Z","timestamp":1765497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"vor","delay-in-days":40,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"National Science and Technology Council under Grant","award":["114-2221-E-259-017"],"award-info":[{"award-number":["114-2221-E-259-017"]}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2025MS1103"],"award-info":[{"award-number":["ZR2025MS1103"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2025MS1044"],"award-info":[{"award-number":["ZR2025MS1044"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2024QF200"],"award-info":[{"award-number":["ZR2024QF200"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Project for Development Innovation of Shandong Natural Science Foundation","award":["ZR2022LZH012"],"award-info":[{"award-number":["ZR2022LZH012"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s44443-025-00390-y","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T22:05:52Z","timestamp":1765577152000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["(k, n) secret base64 data sharing scheme using simple modular arithmetic"],"prefix":"10.1007","volume":"38","author":[{"given":"Ching-Nung","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shengyi","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yu-Sheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lingchen","family":"Gu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1447-0524","authenticated-orcid":false,"given":"Wenbo","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,12]]},"reference":[{"key":"390_CR1","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.image.2019.01.006","volume":"74","author":"AM Ahmadian","year":"2019","unstructured":"Ahmadian AM, Amirmazlaghani M (2019) A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms. Signal Process Image Commun 74:78\u201388","journal-title":"Signal Process Image Commun"},{"key":"390_CR2","doi-asserted-by":"crossref","unstructured":"Bergeron C et al (2023) Selective secret sharing scheme for privacy of image and video compressed in MPEG-like formats. IEEE 25th MMSP 2023","DOI":"10.1109\/MMSP59012.2023.10337672"},{"key":"390_CR3","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1109\/TMM.2019.2900905","volume":"21","author":"S Beugnon","year":"2019","unstructured":"Beugnon S, Puech W, Pedeboy JP (2019) Format-compliant selective secret 3-D object sharing scheme. IEEE Trans Multimed 21:2171\u20132183","journal-title":"IEEE Trans Multimed"},{"key":"390_CR4","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. AFIPS Conference 48:313\u2013317","journal-title":"AFIPS Conference"},{"key":"390_CR5","first-page":"978","volume":"19","author":"B Chen","year":"2022","unstructured":"Chen B et al (2022) Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans Dependable Secure Comput 19:978\u2013991","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"390_CR6","doi-asserted-by":"publisher","first-page":"2382","DOI":"10.1109\/JIOT.2023.3293165","volume":"11","author":"J Huang","year":"2024","unstructured":"Huang J et al (2024) Encrypted domain secret medical-image sharing with secure outsourcing computation in IoT environment. IEEE Internet Things J 11:2382\u20132393","journal-title":"IEEE Internet Things J"},{"key":"390_CR7","doi-asserted-by":"crossref","unstructured":"Kripa M et al (2020) Blockchain framework for social media DRM based on secret sharing,\u201d ICTIS 2020, Smart Innov, Syst Technol\u00a0195, 2021","DOI":"10.1007\/978-981-15-7078-0_43"},{"key":"390_CR8","doi-asserted-by":"publisher","first-page":"6523","DOI":"10.1109\/ACCESS.2019.2963677","volume":"8","author":"J Luo","year":"2020","unstructured":"Luo J et al (2020) Efficient threshold function secret sharing with information-theoretic security. IEEE Access 8:6523\u20136532","journal-title":"IEEE Access"},{"key":"390_CR9","doi-asserted-by":"crossref","unstructured":"Mohan MA, Jayakumar TV, Praveen K (2019) Preserving the privacy of audio file using ideal secret sharing scheme with cloud storage,\u201d ICSCSP 2019. Adv Intell Syst Comput\u00a01118, 2020","DOI":"10.1007\/978-981-15-2475-2_19"},{"key":"390_CR10","doi-asserted-by":"crossref","unstructured":"Prathyusha V, Praveen K (2023) Verifiable secret sharing scheme for audio security,\u201d ICSCSP 2023, LNCS\u00a0864, 2024","DOI":"10.1007\/978-981-99-8628-6_33"},{"issue":"6","key":"390_CR11","doi-asserted-by":"publisher","first-page":"3030","DOI":"10.1109\/TCSVT.2022.3225644","volume":"33","author":"P Puteaux","year":"2023","unstructured":"Puteaux P, Yriarte F, Puech W (2023) A secret jpeg image sharing method over GF(2M) Galois fields. IEEE Trans Circuits Syst Video Technol 33(6):3030\u20133042","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"390_CR12","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22:612\u2013613","journal-title":"Commun ACM"},{"key":"390_CR13","doi-asserted-by":"crossref","unstructured":"Sharma S, Kumar K (2017) GUESS: genetic uses in video encryption with secret sharing,\u201d CVIP 2017. Adv Intell Syst Comput\u00a0703, 2018","DOI":"10.1007\/978-981-10-7895-8_5"},{"key":"390_CR14","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765\u2013770","journal-title":"Comput Graph"},{"key":"390_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.image.2018.05.001","volume":"66","author":"X Wu","year":"2018","unstructured":"Wu X, Yang CN, Zhuang YT, Hsu SC (2018) Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process Image Commun 66:42\u201349","journal-title":"Signal Process Image Commun"},{"key":"390_CR16","volume":"51","author":"X Wu","year":"2020","unstructured":"Wu X, Yang CN, Yang YY (2020) A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. J Inf Secur Appl 51:102452","journal-title":"J Inf Secur Appl"},{"key":"390_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-023-01337-0","author":"ZM Wu","year":"2023","unstructured":"Wu ZM et al (2023) Fpga acceleration of secret sharing for 3D data cubes. J Real-Time Image Process. https:\/\/doi.org\/10.1007\/s11554-023-01337-0","journal-title":"J Real-Time Image Process"},{"issue":"3","key":"390_CR18","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TCC.2023.3259478","volume":"11","author":"L Xiong","year":"2023","unstructured":"Xiong L et al (2023) Reversible data hiding in shared images based on syndrome decoding and homomorphism. IEEE Trans Cloud Comput 11(3):308\u20133098","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"390_CR19","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TCC.2024.3351143","volume":"12","author":"L Xiong","year":"2024","unstructured":"Xiong L et al (2024) Reversible data hiding in shared images with separate cover image reconstruction and secret extraction. IEEE Trans Cloud Comput 12(1):186\u2013199","journal-title":"IEEE Trans Cloud Comput"},{"key":"390_CR20","volume":"62","author":"CN Yang","year":"2021","unstructured":"Yang CN, Tsai PY, Liu YX (2021) A (k, n) secret document sharing with meaningful shares. J Inf Secur Appl 62:102973","journal-title":"J Inf Secur Appl"},{"key":"390_CR21","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.1109\/TCSVT.2024.3489594","volume":"35","author":"CN Yang","year":"2025","unstructured":"Yang CN et al (2025) RP-ASAF: anonymous submission of application framework using RDHSI and polynomial interpolation. IEEE Trans Circuits Syst Video Technol 35:2541\u20132555","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"390_CR22","unstructured":"Yang CN, Chang WJ, Cai SR, Lin CY (2014) Secret image sharing without keeping permutation key,\u201d 2014 International Conference Comm. Tec. (ICCT), pp 410\u2013416"},{"key":"390_CR23","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.1109\/TCSVT.2023.3270882","volume":"33","author":"C Yu","year":"2023","unstructured":"Yu C et al (2023) Reversible data hiding in encrypted images with secret sharing and hybrid coding. IEEE Trans Circuits Syst Video Technol 33:6443\u20136458","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"390_CR24","doi-asserted-by":"publisher","first-page":"15021","DOI":"10.1109\/ACCESS.2018.2811722","volume":"6","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Yang CN, Cao Y, Sun X (2018) Secret image sharing based on encrypted pixels. IEEE Access 6:15021\u201315025","journal-title":"IEEE Access"},{"key":"390_CR25","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/TWC.2023.3278108","volume":"23","author":"Z Zhou","year":"2024","unstructured":"Zhou Z et al (2024) Blockchain-based secure and efficient secret image sharing with outsourcing computation in wireless networks. IEEE Trans Wirel Commun 23:423\u2013435","journal-title":"IEEE Trans Wirel Commun"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00390-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00390-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00390-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:40:02Z","timestamp":1773153602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00390-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,12]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["390"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00390-y","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,12]]},"assertion":[{"value":"17 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"25"}}