{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T16:51:44Z","timestamp":1721494304511},"reference-count":0,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4,1]]},"abstract":"<p>Visual Secret Sharing (VSS) is a powerful approach for protecting image sharing through unsecured computer network such as the Internet. Pixel expansion and bad image quality are the most common problems of this approach. Visual secret sharing technique is proposed for grayscale images to eliminate pixel expansion problem using image compression. The experimental results and security analysis illustrate that the proposed visual secret sharing technique leads to better results in terms of image security and quality together with pixel expansion's elimination. The obtained results showed that the accomplished image security is stronger than the security of the traditional secret sharing technique as the secret key encryption is associated with VSS approach.<\/p>","DOI":"10.4018\/ijdcf.2015040102","type":"journal-article","created":{"date-parts":[[2015,7,2]],"date-time":"2015-07-02T18:29:05Z","timestamp":1435861745000},"page":"20-30","source":"Crossref","is-referenced-by-count":1,"title":["Visual Secret Sharing Without Pixel Expansion"],"prefix":"10.4018","volume":"7","author":[{"given":"Ali Makki","family":"Sagheer","sequence":"first","affiliation":[{"name":"Information Systems Department, University of Anbar, Ramadi, Iraq"}]},{"given":"Laith Hamid","family":"Abed","sequence":"additional","affiliation":[{"name":"Computer Systems Department, Anbar Technical Institute, Middle Technical University, Fallujha, Anbar, Iraq"}]}],"member":"2432","container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=132966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:05:06Z","timestamp":1654142706000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2015040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,4,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2015040102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,1]]}}}