{"id":"https://openalex.org/W1560698438","doi":"https://doi.org/10.1007/978-3-642-55046-1_1","title":"ESSVCS: An Enriched Secret Sharing Visual Cryptography","display_name":"ESSVCS: An Enriched Secret Sharing Visual Cryptography","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W1560698438","doi":"https://doi.org/10.1007/978-3-642-55046-1_1","mag":"1560698438"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-55046-1_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-55046-1_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007853886","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0003-1716-3968"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Liu","raw_affiliation_strings":["Institute of Information Engineering, State Key Laboratory of Information Engineering, Chinese Academy of Sciences, 100093, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, State Key Laboratory of Information Engineering, Chinese Academy of Sciences, 100093, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109048109","display_name":"Wei Qi Yan","orcid":"https://orcid.org/0000-0003-2573-0272"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Wei Q. Yan","raw_affiliation_strings":["School of Computing and Mathematical Sciences, Auckland University of Technology, 1142, Auckland, New Zealand","School of Computing and Mathematical Sciences, Auckland University of Technology, 1142, New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematical Sciences, Auckland University of Technology, 1142, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]},{"raw_affiliation_string":"School of Computing and Mathematical Sciences, Auckland University of Technology, 1142, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100432765","display_name":"Peng Li","orcid":"https://orcid.org/0000-0003-1008-8934"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"education","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Li","raw_affiliation_strings":["Department of Mathematics and Physics, North China Electric Power University, Baoding, Hebei, 071003, China"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Physics, North China Electric Power University, Baoding, Hebei, 071003, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101104050","display_name":"ChuanKun Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuankun Wu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007853886"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.4635,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.71955661,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.863904595375061},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765955924987793},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.7484684586524963},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6538932919502258},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.6396235227584839},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.6196962594985962},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6149200797080994},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5435097813606262},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5275466442108154},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.4709000885486603},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45520973205566406},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4517877697944641},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4496595561504364},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30078011751174927},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18133199214935303}],"concepts":[{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.863904595375061},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765955924987793},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.7484684586524963},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6538932919502258},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.6396235227584839},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.6196962594985962},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6149200797080994},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5435097813606262},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5275466442108154},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.4709000885486603},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45520973205566406},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4517877697944641},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4496595561504364},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30078011751174927},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18133199214935303},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-55046-1_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-55046-1_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:aut.researchgateway.ac.nz:10292/6354","is_oa":false,"landing_page_url":"http://hdl.handle.net/10292/6354","pdf_url":null,"source":{"id":"https://openalex.org/S4406922880","display_name":"AUT Scholarly Commons","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:openrepository.aut.ac.nz:10292/6354","is_oa":false,"landing_page_url":"https://hdl.handle.net/10292/6354","pdf_url":null,"source":{"id":"https://openalex.org/S4306401809","display_name":"Tuwhera (Auckland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39854758","host_organization_name":"Auckland University of Technology","host_organization_lineage":["https://openalex.org/I39854758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3705146111","display_name":null,"funder_award_id":"60903210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3975985793","display_name":null,"funder_award_id":"XDA06010701","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6314305349","display_name":null,"funder_award_id":"XDA06010701","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W196453132","https://openalex.org/W1505779117","https://openalex.org/W1515272795","https://openalex.org/W1557972157","https://openalex.org/W1582212933","https://openalex.org/W1587809429","https://openalex.org/W1589946980","https://openalex.org/W1597133559","https://openalex.org/W1720024462","https://openalex.org/W1730303865","https://openalex.org/W1977596940","https://openalex.org/W1984492306","https://openalex.org/W1985501247","https://openalex.org/W1989752251","https://openalex.org/W2002382695","https://openalex.org/W2011487545","https://openalex.org/W2013578619","https://openalex.org/W2018919412","https://openalex.org/W2046251989","https://openalex.org/W2063215577","https://openalex.org/W2063453673","https://openalex.org/W2107472622","https://openalex.org/W2138813986","https://openalex.org/W2141420453","https://openalex.org/W2144419149","https://openalex.org/W2163400864","https://openalex.org/W2485204867","https://openalex.org/W2485957127","https://openalex.org/W2497291046","https://openalex.org/W2748928085","https://openalex.org/W2913419753","https://openalex.org/W4240963859","https://openalex.org/W4244356278","https://openalex.org/W4253746564","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2032053269","https://openalex.org/W2768332800","https://openalex.org/W2879529912","https://openalex.org/W2083084382","https://openalex.org/W2006088653","https://openalex.org/W2080234894","https://openalex.org/W2741120563","https://openalex.org/W2025440986","https://openalex.org/W3007445677","https://openalex.org/W2394437290"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
