{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:40:21Z","timestamp":1768974021070,"version":"3.49.0"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"2s","license":[{"start":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T00:00:00Z","timestamp":1678838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFA0704703"],"award-info":[{"award-number":["2018YFA0704703"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["12141108, 61971243"],"award-info":[{"award-number":["12141108, 61971243"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin","doi-asserted-by":"crossref","award":["20JCZDJC00610"],"award-info":[{"award-number":["20JCZDJC00610"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["12001398"],"award-info":[{"award-number":["12001398"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"State Key Laboratory of information Security, Institute of Information Engineering Chinese Academy of Sciences","award":["2021-MS-08"],"award-info":[{"award-number":["2021-MS-08"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2023,4,30]]},"abstract":"<jats:p>\n            Visual cryptography scheme is a method of encrypting secret image into\n            <jats:italic>n<\/jats:italic>\n            noiselike shares. The secret image can be reconstructed by stacking adequate shares. In the past two decades, many schemes have been proposed to realize the cheating prevention visual cryptography scheme (CPVCS). Significantly, Ren\u00a0et\u00a0al. [\n            <jats:xref ref-type=\"bibr\">9<\/jats:xref>\n            ] first introduced the idea of CPVCS with the help of Latin square. Inspired by their work, in this article, a new reliable scheme is proposed. More precisely, to facilitate the certification process, we embed meaningful characters into the randomly chosen authentication patterns in each divided blocks. Furthermore, we fix the security vulnerability in the stacked results of share\n            <jats:italic>\n              S\n              <jats:sub>g<\/jats:sub>\n            <\/jats:italic>\n            and verification\n            <jats:italic>\n              Ver\n              <jats:sub>g<\/jats:sub>\n            <\/jats:italic>\n            , where 1\u2264\n            <jats:italic>g<\/jats:italic>\n            \u2264\n            <jats:italic>n<\/jats:italic>\n            . Since the improved scheme encrypts the secret image by utilizing random grids, the generated shares have no pixel expansion. Finally, theoretical analysis and experimental results are conducted to evaluate the efficiency and security of the proposed scheme.\n          <\/jats:p>","DOI":"10.1145\/3550275","type":"journal-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T11:32:59Z","timestamp":1659526379000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6483-1098","authenticated-orcid":false,"given":"Sophie C. C.","family":"Sun","sequence":"first","affiliation":[{"name":"Department of Mathematics, Tianjin University of Finance and Economics, Tianjin, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0542-1088","authenticated-orcid":false,"given":"Yongkang","family":"Zhao","sequence":"additional","affiliation":[{"name":"The Chern institute of Mathematics and LPMC, Nankai University, Tianjin, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9696-8977","authenticated-orcid":false,"given":"Fang-Wei","family":"Fu","sequence":"additional","affiliation":[{"name":"The Chern institute of Mathematics and LPMC, Nankai University, Tianjin, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5635-6749","authenticated-orcid":false,"given":"Yawei","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Information Management, Beijing Information Science and Technology University, Beijing, P.R. China and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"27","article-title":"Preventing cheating in computational visual cryptography","volume":"92","author":"Chang C. C.","year":"2009","unstructured":"C. C. Chang, T. Chen, and L. J. Liu. 2009. Preventing cheating in computational visual cryptography. Fundam. Inf. 92, 1\u20132 (2009), 27\u201342.","journal-title":"Fundam. Inf."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.02.023"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.046"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2008.0064"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6342-0"},{"issue":"7","key":"e_1_3_2_7_2","first-page":"3401","article-title":"Improved contrast for threshold random-grid-based visual cryptography","volume":"12","author":"Hu H.","year":"2018","unstructured":"H. Hu, G. Shen, Z. X. Fu, and B. Yu. 2018. Improved contrast for threshold random-grid-based visual cryptography. KSII Trans. Internet Inf. Syst. 12, 7 (2018), 3401\u20133420.","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.884916"},{"key":"e_1_3_2_9_2","first-page":"1","author":"Naor M.","year":"1994","unstructured":"M. Naor and A. Shamir. 1994. Visual cryptography. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201994), Lecture Notes in Computer Science, Vol. 950. 1\u201312.","journal-title":"Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT\u201994)"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2016.0126"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.02.025"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.01.013"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1364\/OL.12.000377"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.08.006"},{"key":"e_1_3_2_15_2","article-title":"Cheating immune k-out-of-n block-based progressive visual cryptography","volume":"55","author":"Yang C. N.","year":"2020","unstructured":"C. N. Yang, Y. C. Lin, and P. Li. 2020. Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55 (2020), 102660.","journal-title":"J. Inf. Secur. Appl."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-015-0540-4"},{"issue":"4","key":"e_1_3_2_17_2","first-page":"453","article-title":"Ranvijay: Cheating prevention and detection technique in visual secret sharing","volume":"25","author":"Yadav M.","year":"2020","unstructured":"M. Yadav. 2020. Ranvijay: Cheating prevention and detection technique in visual secret sharing. Ing\u00e9n. Syst. d\u2019Inf. 25, 4 (2020), 453\u2013460.","journal-title":"Ing\u00e9n. Syst. d\u2019Inf."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.033"},{"key":"e_1_3_2_19_2","article-title":"A contrast improved or and xor based  \\((k,n)\\)  visual cryptography scheme without pixel expansion","volume":"82","author":"Zhao Y. K.","year":"2022","unstructured":"Y. K. Zhao and F.-W. Fu. 2022. A contrast improved or and xor based \\((k,n)\\) visual cryptography scheme without pixel expansion. J. Vis. Commun. Image Represent. 82 (2022), 103408.","journal-title":"J. Vis. Commun. Image Represent."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11692-4"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3550275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3550275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:23Z","timestamp":1750272203000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3550275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,15]]},"references-count":19,"journal-issue":{"issue":"2s","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1145\/3550275"],"URL":"https:\/\/doi.org\/10.1145\/3550275","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,15]]},"assertion":[{"value":"2021-09-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}