{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T21:15:05Z","timestamp":1773436505449,"version":"3.50.1"},"reference-count":184,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Central Institute of Technology Kokrajhar provides fund through Professional Development Allowance"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3304055","type":"journal-article","created":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T13:45:10Z","timestamp":1691675110000},"page":"98333-98361","source":"Crossref","is-referenced-by-count":10,"title":["Secret Image Sharing Schemes: A Comprehensive Survey"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1224-7783","authenticated-orcid":false,"given":"Sanchita","family":"Saha","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9884-7565","authenticated-orcid":false,"given":"Arup Kumar","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Madras, Chennai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5697-0431","authenticated-orcid":false,"given":"Anup Kumar","family":"Barman","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4408-7307","authenticated-orcid":false,"given":"Amitava","family":"Nag","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, Kokrajhar, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5869-1057","authenticated-orcid":false,"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]}],"member":"263","reference":[{"key":"ref57","first-page":"117","article-title":"A visual cryptography based system for sharing multiple secret images","volume":"7","author":"chen","year":"2007","journal-title":"Proc ISCGAV"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001407005740"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.02.003"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.031"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.02.025"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.02.015"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2015.10.005"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1117\/1.1993627"},{"key":"ref169","first-page":"393","article-title":"Multi secret image sharing scheme based on DNA cryptography with XOR","volume":"118","author":"eswaran","year":"2017","journal-title":"Int J Pure Appl Math"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu105"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1080\/10408340500526766"},{"key":"ref177","first-page":"155","article-title":"Efficient (k,n)-threshold secret sharing method with cheater prevention for QR code application","volume":"23","author":"huang","year":"2022","journal-title":"J Internet Technol"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2016.068"},{"key":"ref175","first-page":"468","article-title":"A novel secret sharing technique using QR code","volume":"4","author":"chuang","year":"2010","journal-title":"Int J Image Process"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IEEC.2009.118"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7455-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.03.012"},{"key":"ref173","first-page":"1","article-title":"Comparison of image quality assessment: PSNR, HVS, SSIM, UIQI","volume":"3","author":"ai-najjar","year":"2012","journal-title":"Int J Sci Eng Res"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_25"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.3390\/e21050502"},{"key":"ref172","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption, cyber journals: Multidisciplinary journals in science and technology","volume":"1","author":"wu","year":"2011","journal-title":"J Sel Areas Telecommun"},{"key":"ref46","article-title":"A study on visual cryptography","author":"wu","year":"1998"},{"key":"ref45","first-page":"1","article-title":"Visual cryptography","author":"naor","year":"1994","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.12.006"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6440(199807)81:7<55::AID-ECJC7>3.0.CO;2-#"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819125"},{"key":"ref41","first-page":"90","article-title":"Sharing decryption in the context of voting or lotteries","author":"fouque","year":"2000","journal-title":"Proc Int Conf Financial Cryptogr"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08351-0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074910"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7937816"},{"key":"ref49","first-page":"996","article-title":"The ringed shadow image technology of visual cryptography by applying diverse rotating angles to bide the secret sharing","author":"hsu","year":"2004","journal-title":"Proc IEEE Int Conf Netw Sens Control"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/2184751.2184860"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-3592-7_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref9","first-page":"371","article-title":"How to share a secret","author":"mignotte","year":"1982","journal-title":"Proc Workshop Cryptogr"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01500-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080618"},{"key":"ref6","first-page":"40","article-title":"An extensive survey of digital image steganography: State of the art","volume":"8","author":"idakwo","year":"2020","journal-title":"J Science Education and Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3917-x"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2489178"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.01.065"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10705-6"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2013.123"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.09.018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2963138"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2818362.2818363"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2016.077203"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.014"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.05.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1084-7"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4836-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.046"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2641378"},{"key":"ref33","first-page":"1","article-title":"A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification","volume":"14","author":"soreng","year":"2022","journal-title":"J Ambient Intell Humanized Comput"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2771255"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2018.8796568"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2944481"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.037"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2018070106"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4536-x"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2116782"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865421"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(99)00127-9"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.875249"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08319-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.09.013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902853"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103413"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/e24030340"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1137\/1024022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2006.12.012"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.01.001"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2012.08.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.11.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6342-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3517140"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2008.0064"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.135"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-3003(03)00355-2"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/849768"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5717-y"},{"key":"ref162","first-page":"832","article-title":"Secret image sharing based on elementary cellular automata","author":"ahmed","year":"2017","journal-title":"Proc Int Conf Adv Intell Syst Inform"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.02.046"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.04.012"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.06.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1515\/gcc-2013-0012"},{"key":"ref12","author":"atkinson","year":"2008","journal-title":"An Introduction to Numerical Analysis"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2015.12.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.02.004"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.02.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.016"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1117\/1.3168644"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1117\/1.1588661"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.07.005"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2013-49"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1117\/1.3268362"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/582\/11559"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.021"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92957-4_86"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.928"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9265-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00239-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229863"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.10.011"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.04.004"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.05.014"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.12.077"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102793"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.115923"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2013.09.005"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10625-5"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.04.002"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.128"},{"key":"ref90","first-page":"964","article-title":"An algorithm for color image compression base on common bit map block truncation coding","author":"chang","year":"2002","journal-title":"Proc JCIS"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.140"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1953-y"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2003.12.011"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1002\/sec.930"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.05.011"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.06.011"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.11.018"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2038113"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh152"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.008"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00108-3"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2935618"},{"key":"ref81","article-title":"Greyscale and colour visual cryptography","author":"muecke","year":"2000"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4421-7"},{"key":"ref84","first-page":"2172","article-title":"Image size invariant visual cryptography","volume":"82","author":"ito","year":"1999","journal-title":"IEICE Trans Fundamentals Electron Commun Comput Sci"},{"key":"ref142","first-page":"449","article-title":"Region-in-region incrementing visual cryptography scheme","author":"yang","year":"2012","journal-title":"Proc Int Workshop Digital Watermarking"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24582-7_11"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2779-y"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2106291"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2180952"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0570-6"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72089-0_4"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.022"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2158096"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.012"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1692600"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.223"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-003-6741-z"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1108\/1\/012082"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-013-9832-5"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102768"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.01.006"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2811722"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.06.012"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4841-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.070"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246123"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2080-5"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.031"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.02.023"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2634-1"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-015-0540-4"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1784-2"},{"key":"ref110","first-page":"421","article-title":"Cheating detection in (k, n) secret image sharing scheme","author":"ma","year":"2019","journal-title":"Proc Int Workshop Digit Watermark"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7710-5"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011271120274"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008382327051"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.01.017"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2133470"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.10.014"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.006"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00258-3"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.018"},{"key":"ref63","first-page":"367","article-title":"A note on efficient color visual encryption","volume":"18","author":"yang","year":"2002","journal-title":"J Inf Sci Eng"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2885-x"},{"key":"ref66","first-page":"1262","article-title":"Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images","volume":"81","author":"koga","year":"1998","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3317-2"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008280705142"},{"key":"ref122","first-page":"1","article-title":"An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares","volume":"2021","author":"chattopadhyay","year":"2021","journal-title":"Multimedia Tools Appl"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/02522667.2017.1385161"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4229-x"},{"key":"ref120","first-page":"1","article-title":"An efficient Boolean based multi-secret image sharing scheme","volume":"76","author":"nag","year":"2019","journal-title":"Multimedia Tools Appl"},{"key":"ref62","first-page":"1","article-title":"Efficient color visual encryption or &#x2018;shared colors of Benetton","author":"rijmen","year":"1996","journal-title":"Proc EUROCRYPT"},{"key":"ref121","first-page":"1","article-title":"A verifiable multi-secret image sharing scheme using XOR operation and hash function","volume":"80","author":"chattopadhyay","year":"2020","journal-title":"Multimedia Tools Appl"},{"key":"ref61","first-page":"197","article-title":"Visual cryptography II: Improving the contrast via the cover base","author":"naor","year":"1996","journal-title":"Proc Int Workshop Secur Protocols"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10214287.pdf?arnumber=10214287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T19:54:44Z","timestamp":1773431684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10214287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":184,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3304055","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}