{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:56:54Z","timestamp":1772679414118,"version":"3.50.1"},"reference-count":25,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"abstract":"<jats:p>Lossless recovery is important for the transmission and storage of image data. In polynomial-based secret image sharing, despite many previous researchers attempted to achieve lossless recovery, none of the proposed work can simultaneously satisfy an efficiency execution and at no cost of some storage capacity. This article proposes a secret sharing scheme with fully lossless recovery based on polynomial-based scheme and modular algebraic recovery. The major difference between the proposed method and polynomial-based scheme is that, instead of only using the first coefficient of sharing polynomial, this article uses the first two coefficients of sharing polynomial to embed the pixels as well as guarantee security. Both theoretical proof and experimental results are given to demonstrate the effectiveness of the proposed scheme.<\/jats:p>","DOI":"10.4018\/ijdcf.2018040107","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T15:22:43Z","timestamp":1519831363000},"page":"120-136","source":"Crossref","is-referenced-by-count":26,"title":["Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery"],"prefix":"10.4018","volume":"10","author":[{"given":"Wanmeng","family":"Ding","sequence":"first","affiliation":[{"name":"National University of Defense Technology,Hefei,China"}]},{"given":"Kesheng","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,Hefei,China"}]},{"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,Hefei,China"}]},{"given":"Lintao","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology,Hefei,China"}]}],"member":"2432","reference":[{"key":"IJDCF.2018040107-0","author":"S. E.Assad","year":"2016","journal-title":"A new chaos-based image encryption system"},{"key":"IJDCF.2018040107-1","doi-asserted-by":"crossref","unstructured":"Belazi, A., & El-Latif, A. A. A. (2016). A simple yet efficient s-box method based chaotic sine map. Optik - International Journal for Light and Electron Optics, 130.","DOI":"10.1016\/j.ijleo.2016.11.152"},{"key":"IJDCF.2018040107-2","author":"G. R.Blakley","year":"1979","journal-title":"Safeguarding cryptographic keys."},{"key":"IJDCF.2018040107-3","author":"D.Bleichenbacher","year":"2000","journal-title":"Noisy Polynomial Interpolation and Noisy Chinese Remaindering. In Advances in Cryptology \u2014 EUROCRYPT 2000"},{"key":"IJDCF.2018040107-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"IJDCF.2018040107-5","first-page":"63","article-title":"Color image sharing method based on lagrange\u2019s interpolating polynomial.","volume":"7231","author":"G.Chen","year":"2008","journal-title":"Jisuanji Celiang Yu Kongzhi"},{"key":"IJDCF.2018040107-6","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4307"},{"key":"IJDCF.2018040107-7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.884011"},{"issue":"8","key":"IJDCF.2018040107-8","first-page":"877","article-title":"A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems.","volume":"4","author":"L.Li","year":"2012","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"key":"IJDCF.2018040107-9","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2012.293"},{"key":"IJDCF.2018040107-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2012.01.003"},{"key":"IJDCF.2018040107-11","article-title":"A novel two-in-one image secret sharing scheme based on perfect black visual cryptography.","author":"P.Li","year":"2016","journal-title":"Journal of Real-Time Image Processing"},{"key":"IJDCF.2018040107-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.07.005"},{"key":"IJDCF.2018040107-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.001"},{"key":"IJDCF.2018040107-14","doi-asserted-by":"crossref","unstructured":"Naor, M., & Shamir, A. (1994). Visual cryptography. In Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques (Vol. 950, pp.1-12). Springer Berlin Heidelberg.","DOI":"10.1007\/BFb0053419"},{"key":"IJDCF.2018040107-15","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"IJDCF.2018040107-16","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"IJDCF.2018040107-17","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/ISDA.2008.103","article-title":"A Lossless Secret Image Sharing Method.","volume":"Vol. 3","author":"H. K.Tso","year":"2008","journal-title":"Eighth International Conference on Intelligent Systems Design and Applications"},{"key":"IJDCF.2018040107-18","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1984-0744931-0"},{"key":"IJDCF.2018040107-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2012.11.001"},{"key":"IJDCF.2018040107-20","article-title":"Progressive visual secret sharing for general access structure with multiple decryptions.","author":"X.Yan","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"IJDCF.2018040107-21","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2017040105"},{"key":"IJDCF.2018040107-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.11.022"},{"key":"IJDCF.2018040107-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2010.04.003"},{"key":"IJDCF.2018040107-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.06.031"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=201539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T23:56:04Z","timestamp":1651794964000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2018040107"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":25,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2018040107","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}