{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:51:36Z","timestamp":1761897096274,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["106-2218-E-468 -001, 107-2221-E-155 -048 -MY3, and 108-2634-F-008 -001."],"award-info":[{"award-number":["106-2218-E-468 -001, 107-2221-E-155 -048 -MY3, and 108-2634-F-008 -001."]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13634-019-0636-2","type":"journal-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T13:02:49Z","timestamp":1565787769000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A novel non-negative matrix factorization technique for decomposition of Chinese characters with application to secret sharing"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0401-8473","authenticated-orcid":false,"given":"Chih-Yang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Li-Wei","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Tsung-Yi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Min-Kuan","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,14]]},"reference":[{"key":"636_CR1","volume-title":"The Chinese character decomposition guidance","author":"P Shinkina","year":"2018","unstructured":"P. Shinkina, The Chinese character decomposition guidance, 2nd edn. (Lulu Press, North Carolina, 2018)","edition":"2"},{"key":"636_CR2","unstructured":"T.-R. Su, H.-Y. Lee, Learning Chinese word representations from glyphs of characters. Conference on Empirical Methods in Natural Language Processing (2017)"},{"key":"636_CR3","doi-asserted-by":"crossref","unstructured":"S.-L. Yeh, W.-L. Chou, P. Ho, Lexical processing of Chinese sub-character components: Semantic activation of phonetic radicals as revealed by the Stroop effect. Sci. Rep. 7 (2017)","DOI":"10.1038\/s41598-017-15536-w"},{"key":"636_CR4","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/0306-4573(90)90110-N","volume":"26","author":"Z Wu","year":"1990","unstructured":"Z. Wu, J.D. White, Computer processing of Chinese characters: An overview of two decades\u2018 research and development. Inf. Process. Manag. 26, 681\u2013692 (1990)","journal-title":"Inf. Process. Manag."},{"key":"636_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8122983","volume-title":"Reconstructing dynamic font-based Chinese characters using support vector machine","author":"H Fujioka","year":"2017","unstructured":"H. Fujioka, W. Zhu, A. Hidaka, H. Kano, Reconstructing dynamic font-based Chinese characters using support vector machine (IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, 2017)"},{"key":"636_CR6","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TPAMI.2017.2695539","volume":"40","author":"X-Y Zhang","year":"2018","unstructured":"X.-Y. Zhang, F. Yin, Y.-M. Zhang, C.-L. Liu, Y. Bengio, Drawing and recognizing Chinese characters with recurrent neural network. IEEE Trans. Pattern Anal. Mach. Intell. 40, 849\u2013862 (2018)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"636_CR7","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.patcog.2016.08.005","volume":"61","author":"X-Y Zhang","year":"2017","unstructured":"X.-Y. Zhang, Y. Bengio, C.-L. Liu, Online and offline handwritten Chinese character recognition: A comprehensive study and new benchmark. Pattern Recogn. 61, 348\u2013360 (2017)","journal-title":"Pattern Recogn."},{"key":"636_CR8","first-page":"1","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Y. Zhang, Z. Liu, W. Zhou, Event recognition based on deep learning in Chinese texts. PLoS One 11, 1\u201318 (2016)","journal-title":"PLoS One"},{"key":"636_CR9","unstructured":"R. Cao, C.L. Tan, A model of stroke extraction from Chinese character images. Int. Conf. Pattern Recognition (2000)"},{"key":"636_CR10","volume-title":"An automatic stroke extraction method using manifold learning","author":"X Chen","year":"2017","unstructured":"X. Chen, Z. Lian, Y. Tang, J. Xiao, An automatic stroke extraction method using manifold learning (Annual Conf. European Association for Computer Graphics, Lyon, 2017)"},{"issue":"3","key":"636_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0167-8655(98)00147-0","volume":"20","author":"JW Kim","year":"1999","unstructured":"J.W. Kim, K. InKim, B.J. Choi, H.J. Kim, Decomposition of Chinese character into strokes using mathematical morphology. Pattern Recogn. Lett. 20(3), 285\u2013292 (1999)","journal-title":"Pattern Recogn. Lett."},{"key":"636_CR12","doi-asserted-by":"crossref","unstructured":"C. Liu, Z. Lian, Y. Tang, J. Xiao, Structure-aware image resizing for Chinese characters. Conf. Multimedia Modeling, 379\u2013390 (2017)","DOI":"10.1007\/978-3-319-51811-4_31"},{"key":"636_CR13","volume-title":"Decomposition and matching: Towards efficient automatic Chinese character stroke extraction","author":"Z Xu","year":"2016","unstructured":"Z. Xu, Y. Liang, Q. Zhang, L. Dong, E. Izquierdo, Decomposition and matching: Towards efficient automatic Chinese character stroke extraction (IEEE Visual Communications and Image Processing, Chengdu, 2016)"},{"key":"636_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/S0015-7368(85)72398-5","volume":"25","author":"SC Leung","year":"1985","unstructured":"S.C. Leung, C.K. Tsui, W.L. Cheung, M.W.L. Chung, A comparative approach to the examination of Chinese handwriting\u2014The Chinese character. J. The Chartered Society of Forensic Sciences 25, 255\u2013267 (1985)","journal-title":"J. The Chartered Society of Forensic Sciences"},{"key":"636_CR15","doi-asserted-by":"crossref","unstructured":"Z. Lian, B. Zhao, J. Xiao, Automatic generation of large-scale handwriting fonts via style learning. ACM SIGGRAPH Conf. and Exhibition on Computer Graphics and Interactive Techniques in Asia Technical Briefs (2016)","DOI":"10.1145\/3005358.3005371"},{"key":"636_CR16","first-page":"1","volume-title":"Proceedings of AAAI Conf. Artificial Intelligence","author":"S Cao","year":"2018","unstructured":"S. Cao, W. Lu, J. Zhou, X. Li, in Proceedings of AAAI Conf. Artificial Intelligence. cw2vec: Learning Chinese word embeddings with stroke n-gram information (2018), pp. 1\u20139"},{"key":"636_CR17","doi-asserted-by":"publisher","first-page":"84","DOI":"10.18653\/v1\/W18-3011","volume-title":"Proceedings of Workshop on Representation Learning for NLP","author":"W Chen","year":"2018","unstructured":"W. Chen, W. Sheng, in Proceedings of Workshop on Representation Learning for NLP. A hybrid learning scheme for Chinese word embedding (2018), pp. 84\u201390"},{"key":"636_CR18","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1038\/44565","volume":"401","author":"DD Lee","year":"1999","unstructured":"D.D. Lee, H.S. Seung, Learning the parts of objects by non-negative matrix factorization. Nature 401, 788\u2013791 (1999)","journal-title":"Nature"},{"key":"636_CR19","first-page":"535","volume-title":"Int. Conf. Neural Information Processing Systems","author":"DD Lee","year":"2000","unstructured":"D.D. Lee, H.S. Seung, in Int. Conf. Neural Information Processing Systems. Algorithms for non-negative matrix factorization (2000), pp. 535\u2013541"},{"key":"636_CR20","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1109\/TNN.2007.891185","volume":"18","author":"C-J Lin","year":"2007","unstructured":"C.-J. Lin, On the convergence of multiplicative update algorithms for nonnegative matrix factorization. IEEE Trans. Neural Netw. 18, 1589\u20131596 (2007)","journal-title":"IEEE Trans. Neural Netw."},{"key":"636_CR21","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.csda.2006.11.006","volume":"52","author":"MW Berry","year":"2007","unstructured":"M.W. Berry, M. Browne, A.N. Langville, V.P. Pauca, R.J. Plemmons, Algorithms and applications for approximate nonnegative matrix factorization. Computational Statistics & Data Analysis 52, 155\u2013173 (2007)","journal-title":"Computational Statistics & Data Analysis"},{"key":"636_CR22","first-page":"19","volume":"11","author":"J Mairal","year":"2010","unstructured":"J. Mairal, F. Bach, J. Ponce, G. Sapiro, Online learning for matrix factorization and sparse coding. J. Mach. Learn. Res. 11, 19\u201360 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"636_CR23","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/TASL.2009.2031510","volume":"18","author":"A Ozerov","year":"2010","unstructured":"A. Ozerov, C. Fevotte, Multichannel nonnegative matrix factorization in convolutive mixtures for audio source separation. IEEE Trans. Audio, Speech & Language Processing 18, 550\u2013563 (2010)","journal-title":"IEEE Trans. Audio, Speech & Language Processing"},{"key":"636_CR24","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1162\/089976601300014385","volume":"13","author":"M Zibulevsky","year":"2001","unstructured":"M. Zibulevsky, B.A. Pearlmutter, Blind source separation by sparse decomposition in a signal dictionary. Neural Comput. 13, 863\u2013882 (2001)","journal-title":"Neural Comput."},{"key":"636_CR25","doi-asserted-by":"publisher","first-page":"1742","DOI":"10.1109\/TIP.2011.2179057","volume":"21","author":"L-W Kang","year":"2012","unstructured":"L.-W. Kang, C.-W. Lin, Y.-H. Fu, Automatic single-image-based rain streaks removal via image decomposition. IEEE Trans. Image Process. 21, 1742\u20131755 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"636_CR26","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TNNLS.2017.2691725","volume":"29","author":"Z Li","year":"2018","unstructured":"Z. Li, J. Tang, X. He, Robust structured nonnegative matrix factorization for image representation. IEEE Trans. Neural Networks and Learning Systems 29, 1947\u20131960 (2018)","journal-title":"IEEE Trans. Neural Networks and Learning Systems"},{"key":"636_CR27","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TPAMI.2011.217","volume":"34","author":"H Liu","year":"2012","unstructured":"H. Liu, Z. Wu, X. Li, D. Cai, T.S. Huang, Constrained nonnegative matrix factorization for image representation. IEEE Trans. Pattern Anal. Mach. Intell. 34, 1299\u20131311 (2012)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"636_CR28","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.jvcir.2014.02.012","volume":"25","author":"C-H Yeh","year":"2014","unstructured":"C.-H. Yeh, L.-W. Kang, Y.-W. Chiou, C.-W. Lin, Shu-Jhen, F. Jiang, Self-learning-based post-processing for image\/video deblocking via sparse representation. J. Vis. Commun. Image Represent. 25, 891\u2013903 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"636_CR29","doi-asserted-by":"publisher","first-page":"20001","DOI":"10.1007\/s11042-017-5430-2","volume":"77","author":"C-H Yeh","year":"2018","unstructured":"C.-H. Yeh, C.-Y. Lin, K. Muchtar, P.-H. Liu, Rain streak removal based on non-negative matrix factorization. Multimed. Tools Appl. 77, 20001\u201320020 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"636_CR30","doi-asserted-by":"crossref","unstructured":"W. Xu, X. Liu, and Y. Gong, Document clustering based on non-negative matrix factorization, Int. ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 267\u2013273, 2003.","DOI":"10.1145\/860435.860485"},{"key":"636_CR31","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T-H Chen","year":"2011","unstructured":"T.-H. Chen, K.-H. Tsao, Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"key":"636_CR32","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1109\/TIFS.2018.2819125","volume":"13","author":"Y Cheng","year":"2018","unstructured":"Y. Cheng, Z. Fu, B. Yu, Improved visual secret sharing scheme for QR code applications. IEEE Trans. Information Forensics and Security 13, 2393\u20132403 (2018)","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"636_CR33","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y-C Hou","year":"2003","unstructured":"Y.-C. Hou, Visual cryptography for color images. Pattern Recogn. 36, 1619\u20131629 (2003)","journal-title":"Pattern Recogn."},{"key":"636_CR34","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques","author":"M Naor","year":"1994","unstructured":"M. Naor, A. Shamir, in Workshop on the Theory and Application of Cryptographic Techniques. Visual cryptography (1994)"},{"key":"636_CR35","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TIFS.2017.2750104","volume":"13","author":"M Sasaki","year":"2018","unstructured":"M. Sasaki, Y. Watanabe, Visual secret sharing schemes encrypting multiple images. IEEE Trans. Information Forensics and Security 13, 356\u2013365 (2018)","journal-title":"IEEE Trans. Information Forensics and Security"},{"key":"636_CR36","unstructured":"M.E. Whitman, H.J. Mattord, Principles of information security, 3rd edn. (Course Technology, 2007)"},{"key":"636_CR37","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"636_CR38","doi-asserted-by":"publisher","first-page":"18074","DOI":"10.1109\/ACCESS.2018.2820724","volume":"6","author":"X Zhang","year":"2018","unstructured":"X. Zhang, S.-H. Seo, C. Wang, A lightweight encryption method for privacy protection in surveillance videos. IEEE Access 6, 18074\u201318087 (2018)","journal-title":"IEEE Access"},{"key":"636_CR39","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s001860000043","volume":"51","author":"J Fliege","year":"2000","unstructured":"J. Fliege, B.F. Svaiter, Steepest descent methods for multicriteria optimization. Math. Meth. Oper. Res. 51, 479\u2013494 (2000)","journal-title":"Math. Meth. Oper. Res."},{"key":"636_CR40","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.brainresbull.2006.07.005","volume":"70","author":"J Luo","year":"2006","unstructured":"J. Luo, K. Niki, G. Knoblich, Perceptual contributions to problem solving: Chunk decomposition of Chinese characters. Brain Res. Bull. 70, 430\u2013443 (2006)","journal-title":"Brain Res. Bull."},{"issue":"162","key":"636_CR41","first-page":"1","volume":"2018","author":"Z Chai","year":"2018","unstructured":"Z. Chai, S. Liang, G. Hu, L. Zhang, Y. Wu, C. Cao, Periodic characteristics of the Josephus ring and its application in image scrambling. EURASIP J. Wirel. Commun. Netw. 2018(162), 1\u201311 (2018)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"5","key":"636_CR42","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.patrec.2009.11.008","volume":"31","author":"G Ye","year":"2010","unstructured":"G. Ye, Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347\u2013354 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"636_CR43","doi-asserted-by":"publisher","first-page":"6245","DOI":"10.1109\/TGRS.2018.2834567","volume":"56","author":"X-R Feng","year":"2018","unstructured":"X.-R. Feng, H.-C. Li, J. Li, Q. Du, A. Plaza, W.J. Emery, Hyperspectral unmixing using sparsity-constrained deep nonnegative matrix factorization with total variation. IEEE Trans. Geoscience and Remote Sensing (in press 56, 6245\u20136257 (2018)","journal-title":"IEEE Trans. Geoscience and Remote Sensing"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-019-0636-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13634-019-0636-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-019-0636-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T23:10:45Z","timestamp":1597273845000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13634-019-0636-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,14]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["636"],"URL":"https:\/\/doi.org\/10.1186\/s13634-019-0636-2","relation":{},"ISSN":["1687-6180"],"issn-type":[{"type":"electronic","value":"1687-6180"}],"subject":[],"published":{"date-parts":[[2019,8,14]]},"assertion":[{"value":"31 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This study does not involve human participants, human data, or human tissue.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"In the manuscript, there is no any individual person\u2019s data.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"35"}}