{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:25:48Z","timestamp":1758893148794,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T00:00:00Z","timestamp":1554422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1399-z","type":"journal-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T12:03:10Z","timestamp":1554465790000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["A new secure transmission scheme between senders and receivers using HVCHC without any loss"],"prefix":"10.1186","volume":"2019","author":[{"given":"Saad","family":"Almutairi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1837-6797","authenticated-orcid":false,"given":"Manimurugan","family":"S","sequence":"additional","affiliation":[]},{"given":"Majed","family":"Aborokbah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,5]]},"reference":[{"key":"1399_CR1","first-page":"1","volume-title":"Visual cryptography, in: advances in cryptology, EUROCRYPT\u201994, in: LNCS","author":"M Naor","year":"1994","unstructured":"M. Naor, A. Shamir, Visual cryptography, in: advances in cryptology, EUROCRYPT\u201994, in: LNCS, vol 950 (1994), pp. 1\u201312."},{"issue":"6","key":"1399_CR2","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1080\/00029890.1929.11986963","volume":"36","author":"LS Hill","year":"1929","unstructured":"L.S. Hill, Cryptography in an algebraic alphabet. Am. Math. Mon. 36(6), 306\u2013312 (1929).","journal-title":"Am. Math. Mon."},{"key":"1399_CR3","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/00029890.1931.11987161","volume":"38","author":"LS Hill","year":"1931","unstructured":"L.S. Hill, Concerning certain linear transformation apparatus of cryptography. Am. Math. Mon. 38, 135\u2013154 (1931).","journal-title":"Am. Math. Mon."},{"key":"1399_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.image.2016.09.001","volume":"48","author":"Z Shao","year":"2016","unstructured":"Z. Shao, Y. Shang, R. Zeng, H. Shu, G. Coatrieux, J. Wu, Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process. Image Commun. 48, 12\u201321 (2016).","journal-title":"Signal Process. Image Commun."},{"key":"1399_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"S. Cimato, R. De Prisco, A. De Santis, Optimal colored threshold visual cryptography schemes. Des. Codes Cryptography 35, 311\u2013335 (2005).","journal-title":"Des. Codes Cryptography"},{"key":"1399_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes. Comput. J. 49, 97\u2013107 (2006).","journal-title":"Comput. J."},{"key":"1399_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ipl.2004.10.011","volume":"93","author":"S Cimato","year":"2005","unstructured":"S. Cimato, A. De Santis, A.L. Ferrara, B. Masucci, Ideal contrast visual cryptography schemes with reversing. Inf. Process. Letter 93, 199\u2013206 (2005).","journal-title":"Inf. Process. Letter"},{"key":"1399_CR8","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S Cimato","year":"2007","unstructured":"S. Cimato, R. De Prisco, A. De Santis, Colored visual cryptography without color darkening. Theor. Comput. Sci. 374, 261\u2013276 (2007).","journal-title":"Theor. Comput. Sci."},{"key":"1399_CR9","unstructured":"S. Cimato, R. De Prisco, A. De Santis, Visual cryptography for color images, in: visual cryptography and secret image sharing (CRC Press, London, 2012), pp. 31\u201356 ISBN 978\u20131\u20134398-3721-4."},{"key":"1399_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.tcs.2013.09.005","volume":"510","author":"R Prisco De","year":"2013","unstructured":"R. De Prisco, A. De Santis, Color visual cryptography schemes for black and white secret images. Theor. Comput. Sci. 510, 62\u201386 (2013).","journal-title":"Theor. Comput. Sci."},{"key":"1399_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.tcs.2015.09.016","volume":"609","author":"C-N Yang","year":"2016","unstructured":"C.-N. Yang, L.-Z. Sun, S.-R. Cai, Extended color visual cryptography for black and white secret image. Theor. Comput. Sci. 609, 143\u2013161 (2016).","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"1399_CR12","first-page":"129","volume":"56","author":"S Manimurugan","year":"2011","unstructured":"S. Manimurugan, K. Porkumaran, Secure medical image compression using block pixel Sort algorithm. Eur. J. Sci. Res. 56(2), 129\u2013138 (2011).","journal-title":"Eur. J. Sci. Res."},{"issue":"2","key":"1399_CR13","first-page":"139","volume":"56","author":"S Manimurugan","year":"2011","unstructured":"S. Manimurugan, K. Porkumaran, Fast and efficient secure medical image compression schemes. Eur. J. Sci Res 56(2), 139\u2013150 (2011).","journal-title":"Eur. J. Sci Res"},{"key":"1399_CR14","doi-asserted-by":"publisher","first-page":"8527","DOI":"10.1007\/s11042-015-2770-7","volume":"75","author":"T Amiri","year":"2016","unstructured":"T. Amiri, M.E. Moghaddam, A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images. Multimed. Tools Appl. 75, 8527\u20138543 (2016).","journal-title":"Multimed. Tools Appl."},{"key":"1399_CR15","doi-asserted-by":"publisher","first-page":"8657","DOI":"10.1007\/s11042-015-2779-y","volume":"75","author":"X Yan","year":"2016","unstructured":"X. Yan, S. Wang, X. Niu, Threshold progressive visual cryptography construction with unexpanded shares. Multimed. Tools Appl. 75, 8657\u20138674 (2016).","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"1399_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.4018\/IJDCF.2016070106","volume":"8","author":"G Wang","year":"2016","unstructured":"G. Wang, F. Liu, W.Q. Yan, Basic visual cryptography using braille. Int. J. Digit. Crime Forensics 8(3), 85\u201393 (2016).","journal-title":"Int. J. Digit. Crime Forensics"},{"issue":"1","key":"1399_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.4018\/IJDCF.2015010102","volume":"7","author":"S Manimurugan","year":"2015","unstructured":"S. Manimurugan, C. Narmatha, Secure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressions. Int. J. Digit. Crime Forensics 7(1), 26\u201350 (2015).","journal-title":"Int. J. Digit. Crime Forensics"},{"issue":"10","key":"1399_CR18","first-page":"446","volume":"14","author":"S Al-Mutairi","year":"2016","unstructured":"S. Al-Mutairi, S. Manimurugan, An efficient secret image transmission scheme using Dho-encryption technique. Int. J. Comput. Sci. Inf. Secur 14(10), 446\u2013460 (2016).","journal-title":"Int. J. Comput. Sci. Inf. Secur"},{"issue":"2","key":"1399_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.21833\/ijaas.2017.02.010","volume":"4","author":"S Al-Mutairi","year":"2017","unstructured":"S. Al-Mutairi, S. Manimurugan, The clandestine image transmission scheme to prevent from the intruders. Int. J. Adv. Appl. Sci. 4(2), 52\u201360 (2017).","journal-title":"Int. J. Adv. Appl. Sci."},{"issue":"8","key":"1399_CR20","first-page":"403","volume":"62","author":"S Manimurugan","year":"2014","unstructured":"S. Manimurugan, K. Porkumaran, C. Narmatha, \u201cThe new block pixel Sort algorithm for TVC encrypted medical image\u201d, imaging science. Journal 62(8), 403\u2013414 (2014).","journal-title":"Journal"},{"issue":"3","key":"1399_CR21","first-page":"552","volume":"69","author":"S Manimurugan","year":"2014","unstructured":"S. Manimurugan, C. Narmatha, K. Porkumaran, The new approach of visual cryptography scheme for protecting the grayscale medical images. J. Theor. Appl. Inf. Technol. 69(3), 552\u2013561 (2014).","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"1399_CR22","first-page":"56","volume":"5","author":"AVN Krishna","year":"2012","unstructured":"A.V.N. Krishna, K. Madhuravani, A Modified Hill cipher using randomized approach. Int. J. Comput. Netw. Inf. Secur. 5, 56\u201362 (2012).","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"issue":"2","key":"1399_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.9790\/0661-1121014","volume":"11","author":"AHP Suman Chandrasekhar","year":"2013","unstructured":"A.H.P. Suman Chandrasekhar, K. Adarsh, S. Sasi, A secure encryption technique based on advanced Hill cipher for a public key cryptosystem. IOSR J. Comput. Eng. 11(2), 10\u201314 (2013).","journal-title":"IOSR J. Comput. Eng."},{"issue":"2","key":"1399_CR24","first-page":"179","volume":"7","author":"MNA Rahman","year":"2013","unstructured":"M.N.A. Rahman, A.F.A. Abidin, M.K. Yusof, N.S.M. Usop, Cryptography: a new approach of classical Hill cipher. Int. J. Secur. Its Appl. 7(2), 179\u2013190 (2013).","journal-title":"Int. J. Secur. Its Appl."},{"key":"1399_CR25","doi-asserted-by":"publisher","first-page":"3812","DOI":"10.1016\/j.ijleo.2015.07.117","volume":"126","author":"DC Mishra","year":"2015","unstructured":"D.C. Mishra, R.K. Sharma, R. Ranjan, M. Hanmandlu, Security of RGB image data by affine hill cipher over SLn(Fq) and Mn(Fq) domains with Arnold transform. Optik 126, 3812\u20133822 (2015).","journal-title":"Optik"},{"key":"1399_CR26","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.procs.2010.11.031","volume":"2","author":"B Acharya","year":"2010","unstructured":"B. Acharya, M.D. Sharma, S. Tiwari, V.K. Minz, Privacy protection of biometric traits using modified Hill cipher with Involutory key and robust cryptosystem. Procedia Comput. Sci. 2, 242\u2013247 (2010).","journal-title":"Procedia Comput. Sci."},{"key":"1399_CR27","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.protcy.2012.05.016","volume":"4","author":"KA Reddy","year":"2012","unstructured":"K.A. Reddy, B. Vishnuvardhan, Madhuviswanatham, A.V.N. Krishna, A modified Hill cipher based on circulant matrices. Procedia Technol 4, 114\u2013118 (2012).","journal-title":"Procedia Technol"},{"issue":"11","key":"1399_CR28","first-page":"34","volume":"108","author":"N Sharma","year":"2014","unstructured":"N. Sharma, S. Chirgaiya, A novel approach to Hill cipher. Int. J. Comput. Appl. 108(11), 34\u201337 (2014).","journal-title":"Int. J. Comput. Appl."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1399-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1399-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1399-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T23:06:25Z","timestamp":1585955185000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1399-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,5]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1399"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1399-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,4,5]]},"assertion":[{"value":"6 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Yes.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"88"}}