{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:05:47Z","timestamp":1760241947777,"version":"build-2065373602"},"reference-count":18,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T00:00:00Z","timestamp":1540771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Imaging"],"abstract":"<jats:p>This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares. In existing methods, the surface of key images is not visually pleasant and is not exploited for communicating textual or pictorial information. Presently, we propose a pictogram-based visual cryptography technique, which generates shares textured with customizable and aesthetic rendering. Moreover, robustness characteristics of this technique to the automated decoding of the secret message are presented. Experimental results show concrete personalized shares and their applicative potentials for security and creative domains.<\/jats:p>","DOI":"10.3390\/jimaging4110126","type":"journal-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T11:10:41Z","timestamp":1540811441000},"page":"126","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Personalized Shares in Visual Cryptography"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4804-4796","authenticated-orcid":false,"given":"Karim","family":"Hammoudi","sequence":"first","affiliation":[{"name":"Department of Computer Science, IRIMAS Institute, Universit\u00e9 de Haute-Alsace, F-68100 Mulhouse, France"},{"name":"Universit\u00e9 de Strasbourg, 67081 Strasbourg, France"}]},{"given":"Mahmoud","family":"Melkemi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, IRIMAS Institute, Universit\u00e9 de Haute-Alsace, F-68100 Mulhouse, France"},{"name":"Universit\u00e9 de Strasbourg, 67081 Strasbourg, France"}]}],"member":"1968","published-online":{"date-parts":[[2018,10,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","article-title":"Encryption of pictures and shapes by random grids","volume":"12","author":"Kafri","year":"1987","journal-title":"Opt. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"De Santis, A. (1995). Visual cryptography. Advances in Cryptology\u2014EUROCRYPT\u201994, Springer.","DOI":"10.1007\/BFb0053418"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s11554-015-0505-7","article-title":"Efficient algorithm for transferring a real-time HEVC stream with haptic data through the internet","volume":"12","author":"Kokkonis","year":"2016","journal-title":"J. Real-Time Image Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/s11554-015-0509-3","article-title":"Encryption algorithm for efficient transmission of HEVC media","volume":"12","author":"Memos","year":"2016","journal-title":"J. Real-Time Image Process."},{"key":"ref_5","first-page":"27","article-title":"Algorithms for efficient digital media transmission over IoT and cloud networking","volume":"5","author":"Stergiou","year":"2018","journal-title":"J. Multimed. Inf. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","article-title":"Halftone visual cryptography","volume":"15","author":"Zhou","year":"2006","journal-title":"IEEE Trans. Image Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","article-title":"Visual cryptography for color images","volume":"36","author":"Hou","year":"2003","journal-title":"Pattern Recognit."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/j.compeleceng.2017.09.017","article-title":"Extended visual cryptography techniques for true color images","volume":"70","author":"Dhiman","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mostaghim, M., and Boostani, R. (2014, January 3\u20134). CVC: Chaotic visual cryptography to enhance steganography. Proceedings of the 2014 11th International ISC Conference on Information Security and Cryptology, Tehran, Iran.","DOI":"10.1109\/ISCISC.2014.6994020"},{"key":"ref_10","unstructured":"Seder, R.B. (2013). Santa! A Scanimation Picture Book, Workman Publishing."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Munir, R. (December, January 29). Visual Cryptography of Animated GIF Image Based on XOR Operation. Proceedings of the 2017 International Conference on Advanced Computing and Applications (ACOMP), Ho Chi Minh City, Vietnam.","DOI":"10.1109\/ACOMP.2017.14"},{"key":"ref_12","unstructured":"Borchert, B. (2007). Segment-Based Visual Cryptography, Wilhelm-Schickard-Institut f\u00fcr Informatik, Universit\u00e4t T\u00fcbingen."},{"key":"ref_13","unstructured":"Kinsley, C. (1903). Method of Electric Signaling. (Patent US1126641A)."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.jss.2015.07.009","article-title":"An aesthetic QR code solution based on error correction mechanism","volume":"116","author":"Li","year":"2016","journal-title":"J. Syst. Softw."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Xu, M., Su, H., Li, Y., Li, X., Liao, J., Niu, J., Lv, P., and Zhou, B. (arXiv, 2018). Stylize Aesthetic QR Code, arXiv.","DOI":"10.1109\/TMM.2019.2891420"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","article-title":"A Survey of Man In The Middle Attacks","volume":"18","author":"Conti","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Stasik, P.M., and Balcerek, J. (2017, January 20\u201322). Improvements in upscaling of pixel art. Proceedings of the 2017 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), Poznan, Poland.","DOI":"10.23919\/SPA.2017.8166895"},{"key":"ref_18","unstructured":"Icon (2018, July 15). GAMBY Image Formats. Available online: http:\/\/logicalzero.com\/gamby\/reference\/image_formats.html."}],"container-title":["Journal of Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2313-433X\/4\/11\/126\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:26:46Z","timestamp":1760196406000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2313-433X\/4\/11\/126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,29]]},"references-count":18,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["jimaging4110126"],"URL":"https:\/\/doi.org\/10.3390\/jimaging4110126","relation":{},"ISSN":["2313-433X"],"issn-type":[{"type":"electronic","value":"2313-433X"}],"subject":[],"published":{"date-parts":[[2018,10,29]]}}}