{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:12:18Z","timestamp":1746072738753,"version":"3.40.4"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Education, Government of India","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,12]]},"DOI":"10.1109\/ocit65031.2024.00112","type":"proceedings-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:29:52Z","timestamp":1745947792000},"page":"609-616","source":"Crossref","is-referenced-by-count":0,"title":["ESIS-SSI: Efficient (n, n) Secret Image Sharing with Shrinking Shadow Images"],"prefix":"10.1109","author":[{"given":"Purushothama B","family":"R","sequence":"first","affiliation":[{"name":"National Institute of Technology Karnataka, Surathkal,Department of Information Technology,Mangalore,Karnataka,India,575025"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret image sharing","volume":"26","author":"Thien","year":"2002","journal-title":"Computers & Graphics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"106937","DOI":"10.1016\/j.compeleceng.2020.106937","article-title":"Pixel co-ordinate-based secret image sharing scheme with constant size shadow images","volume":"89","author":"Patil","year":"2021","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"ref3","first-page":"9274415","article-title":"Effi-cient secret image sharing scheme with authentication and cheating prevention","volume":"2021","author":"Zhang","year":"2021","journal-title":"Mathematical Problems in Engineering"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"108931","DOI":"10.1016\/j.sigpro.2023.108931","article-title":"Secret image sharing scheme with lossless recovery and high efficiency","volume":"206","author":"Luo","year":"2023","journal-title":"Signal Processing"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jisa.2017.01.006","article-title":"A new boolean-based multiple secret image sharing scheme to share different sized secret images","volume":"33","author":"Chen","year":"2017","journal-title":"Journal of Information Security and Applications"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2014.01.001","article-title":"A secure boolean-based multi-secret image sharing scheme","volume":"92","author":"Chen","year":"2014","journal-title":"Journal of Systems and Software"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jvcir.2018.10.014","article-title":"A (t,n)-multi secret image sharing scheme based on boolean operations","volume":"57","author":"Kabirirad","year":"2018","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2018.8796568"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902853"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jisa.2019.03.018","article-title":"Improvement of (n, n)-multi-secret image sharing schemes based on boolean operations","volume":"47","author":"Kabirirad","year":"2019","journal-title":"Journal of Information Security and Applications"},{"issue":"5","key":"ref11","doi-asserted-by":"crossref","first-page":"6247","DOI":"10.1007\/s11042-016-3317-2","article-title":"Design of a new efficient and secure multi-secret images sharing scheme","volume":"76","author":"Faraoun","year":"2017","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"ref12","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s11042-016-4229-x","article-title":"Efficient and secure multi secret sharing schemes based on boolean xor and arithmetic modulo","volume":"77","author":"Deshmukh","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jss.2015.01.031","article-title":"Enhanced boolean-based multi secret image sharing scheme","volume":"116","author":"Yang","year":"2016","journal-title":"Journal of Systems and Software"},{"issue":"24","key":"ref14","doi-asserted-by":"crossref","first-page":"34969","DOI":"10.1007\/s11042-021-10523-w","article-title":"An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares","volume":"81","author":"Chattopadhyay","year":"2022","journal-title":"Multimedia Tools and Applications"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jvcir.2017.09.013","article-title":"A novel approach for sharing multiple color images by employing chinese remainder theorem","volume":"49","author":"Deshmukh","year":"2017","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"23","key":"ref16","doi-asserted-by":"crossref","first-page":"16219","DOI":"10.1007\/s11042-019-07807-7","article-title":"An efficient boolean based multi-secret image sharing scheme","volume":"79","author":"Nag","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"28","key":"ref17","doi-asserted-by":"crossref","first-page":"35051","DOI":"10.1007\/s11042-020-09174-0","article-title":"A verifiable multi-secret image sharing scheme using xor operation and hash function","volume":"80","author":"Chattopadhyay","year":"2021","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"ref18","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.sigpro.2010.06.012","article-title":"Efficient multi-secret image sharing based on boolean operations","volume":"91","author":"Chen","year":"2011","journal-title":"Signal Processing"},{"issue":"10","key":"ref19","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","article-title":"Two secret sharing schemes based on boolean operations","volume":"40","author":"Wang","year":"2007","journal-title":"Pattern Recognition"},{"issue":"17","key":"ref20","doi-asserted-by":"crossref","first-page":"24837","DOI":"10.1007\/s11042-019-7710-5","article-title":"Lossless progressive secret sharing for grayscale and color images","volume":"78","author":"Prasetyo","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jvcir.2015.01.017","article-title":"User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion","volume":"29","author":"Ou","year":"2015","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"12","key":"ref22","doi-asserted-by":"crossref","first-page":"7113","DOI":"10.1007\/s11042-015-2634-1","article-title":"Highly efficient and secure multi-secret image sharing scheme","volume":"75","author":"Chen","year":"2016","journal-title":"Multimedia Tools and Applications"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-87126-9","volume-title":"Introduction to cryptography: principles and applications","author":"Delfs","year":"2002"}],"event":{"name":"2024 OITS International Conference on Information Technology (OCIT)","start":{"date-parts":[[2024,12,12]]},"location":"Vijayawada, India","end":{"date-parts":[[2024,12,14]]}},"container-title":["2024 OITS International Conference on Information Technology (OCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10973619\/10973620\/10973763.pdf?arnumber=10973763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:56:12Z","timestamp":1745988972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10973763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ocit65031.2024.00112","relation":{},"subject":[],"published":{"date-parts":[[2024,12,12]]}}}