{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:31:35Z","timestamp":1760239895615,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["105-2410-H-126 -005 -MY3"],"award-info":[{"award-number":["105-2410-H-126 -005 -MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>A subtopic of visual secret sharing (VSS) is information hiding-based VSS (IH-VSS), which embeds secret messages into images using an information hiding technique. In the IH-VSS scheme, stego-images are divided into shadows under the guidance and constraint of some predetermined approaches. In order to achieve the purpose of security and reliability, the hidden information cannot be recovered unless a certain amount or all of the credible shadows work together. In this paper, we propose a (2, 2) IH-VSS scheme with reversibility and friendliness. In the shadow generation phase, two meaningful shadow images are produced and then distributed. In the extraction and restoration phase, the hidden secret information and cover image, respectively, can be reconstructed credibly and correctly. No complex computation of shadow generation is involved, but high security is achieved. Moreover, a satisfying peak-signal-to-noise ratio (PSNR) is obtained with the high embedding capacity of 1.59 bpp in a very simple and effective way.<\/jats:p>","DOI":"10.3390\/sym11010079","type":"journal-article","created":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T11:36:42Z","timestamp":1547206602000},"page":"79","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Two Meaningful Shadows to Share Secret Messages with Reversibility"],"prefix":"10.3390","volume":"11","author":[{"given":"Lin","family":"Li","sequence":"first","affiliation":[{"name":"Computer Engineering College, Ji Mei University, Xiamen 361021, China"},{"name":"Department of Information Engineering and Computer Science, Feng Chia University, 100Wenhwa Road, Seatwen, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4480-7351","authenticated-orcid":false,"given":"Chia-Chen","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Management, Providence University, Taichung 43301, Taiwan"}]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, 100Wenhwa Road, Seatwen, Taichung 40724, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_3","unstructured":"American National Standards Institute (1981). American National Standard Data Encryption Algorithm, American National Standards Institute."},{"key":"ref_4","unstructured":"Daemen, J., and Rijmen, V. (2018, December 01). AES Proposal: Rijndael. Available online: http:\/\/www.cs.miami.edu\/home\/burt\/learning\/Csc688.012\/rijndael\/rijndael_doc_V2.pdf."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Blakley, G.R. (1979). Safeguarding cryptographic keys. Managing Requirements Knowledge. Int. Workshop (AFIPS), 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref_7","first-page":"1","article-title":"Visual cryptography","volume":"Volume 950","year":"1994","journal-title":"Advances in Cryptology\u2014EUROCRYPT"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/358746.358762","article-title":"On sharing secrets and Reed-Solomon codes","volume":"24","author":"McEliece","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","article-title":"On secret sharing systems","volume":"29","author":"Karnin","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_10","first-page":"468","article-title":"Some ideal secret sharing schemes","volume":"Volume 434","author":"Quisquater","year":"1989","journal-title":"Advances in Cryptology\u2014EUROCRYPT"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","article-title":"Generalized secret sharing and monotone functions","volume":"Volume 403","author":"Benaloh","year":"1988","journal-title":"Advances in Cryptology\u2014CRYPTO"},{"key":"ref_12","first-page":"416","article-title":"Constructions and bounds for visual cryptography","volume":"1099","author":"Ateniese","year":"1996","journal-title":"Autom. Lang. Program."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1142\/S0129054104002510","article-title":"Several generalizations of shamir\u2019s secret sharing scheme","volume":"15","author":"Lai","year":"2004","journal-title":"Int. J. Found. Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","article-title":"Probabilistic visual cryptography schemes","volume":"49","author":"Cimato","year":"2006","journal-title":"Comput. J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret image sharing","volume":"26","author":"Thien","year":"2002","journal-title":"Comput. Graph."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/S0164-1212(02)00034-1","article-title":"Sharing multiple secrets in digital images","volume":"64","author":"Tsai","year":"2002","journal-title":"J. Syst. Softw."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","article-title":"Secret image sharing with steganography and authentication","volume":"73","author":"Lin","year":"2004","journal-title":"J. Syst. Softw."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1016\/j.patcog.2004.01.002","article-title":"Sharing and hiding secret images with size constraint","volume":"37","author":"Wu","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","article-title":"Improvements of image sharing with steganography and authentication","volume":"80","author":"Yang","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","article-title":"Sharing secrets in stego images with authentication","volume":"41","author":"Chang","year":"2008","journal-title":"Pattern Recognit."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, P.Y., Wang, Z.H., and Li, M.C. (2010). A Sudoku-based secret image sharing scheme with reversibility (invited paper). J. Commun., 5.","DOI":"10.4304\/jcm.5.1.5-12"},{"key":"ref_22","first-page":"44","article-title":"A novel (n, n) secret image sharing scheme based on Sudoku","volume":"11","author":"Wang","year":"2013","journal-title":"J. Electr. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jvcir.2015.01.011","article-title":"Quadri-directional searching algorithm for secret image sharing using meaningful shadows","volume":"28","author":"Huynh","year":"2015","journal-title":"J. Vis. Comun. Image Represent."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1049\/iet-ipr.2015.0568","article-title":"Distortion-free secret image sharing method with two meaningful shadows","volume":"10","author":"Chang","year":"2016","journal-title":"IET Image Process"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"25295","DOI":"10.1007\/s11042-018-5785-z","article-title":"A turtle shell-based visual secret sharing scheme with reversibility and authentication","volume":"77","author":"Liu","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"9337","DOI":"10.1007\/s11042-016-3535-7","article-title":"Secret sharing: using meaningful image shadows based on Gray code","volume":"76","author":"Cheng","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"7677","DOI":"10.1007\/s11042-016-3429-8","article-title":"A secure image sharing scheme with high quality stego-images based on steganography","volume":"76","author":"He","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Liu, Y.J., and Chen, K.M. (2018). Real-time adaptive visual secret sharing with reversibility and high capacity. J. Real. Time Image Process., 1\u201311.","DOI":"10.1007\/s11554-018-0813-9"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.camwa.2010.01.006","article-title":"Improved modification direction methods","volume":"60","author":"Kim","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","article-title":"Efficient steganographic embedding by exploiting modification direction","volume":"10","author":"Zhang","year":"2006","journal-title":"IEEE Commun. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Chen, K.M., and Chang, C.C. (2019). High-capacity reversible data hiding in encrypted images based on extended Run-Length coding and block-based MSB plane rearrangement. J. Vis. Commun. Image Represent., in press.","DOI":"10.1016\/j.jvcir.2018.12.023"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","article-title":"Reversible data hiding scheme based on exploiting modification direction with two steganographic images","volume":"74","author":"Qin","year":"2015","journal-title":"Multimed. Tools Appl."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/1\/79\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:25:25Z","timestamp":1760185525000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/1\/79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,11]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["sym11010079"],"URL":"https:\/\/doi.org\/10.3390\/sym11010079","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2019,1,11]]}}}