{"id":"https://openalex.org/W129822334","doi":"https://doi.org/10.1007/978-3-642-55046-1_7","title":"Flexible Visual Cryptography Scheme and Its Application","display_name":"Flexible Visual Cryptography Scheme and Its Application","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W129822334","doi":"https://doi.org/10.1007/978-3-642-55046-1_7","mag":"129822334"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-55046-1_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-55046-1_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007853886","display_name":"Feng Liu","orcid":"https://orcid.org/0000-0003-1716-3968"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Liu","raw_affiliation_strings":["Institute of Information Engineering, State Key Laboratory of Information Engineering, Chinese Academy of Sciences, 100093, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, State Key Laboratory of Information Engineering, Chinese Academy of Sciences, 100093, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012129627","display_name":"Teng Guo","orcid":"https://orcid.org/0000-0001-6604-475X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Teng Guo","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","University of Chinese Academy of Sciences, Beijing, 100190, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, 100190, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101104050","display_name":"ChuanKun Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"ChuanKun Wu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034420945","display_name":"Ching\u2010Nung Yang","orcid":"https://orcid.org/0000-0002-3881-7329"},"institutions":[{"id":"https://openalex.org/I33096239","display_name":"National Dong Hwa University","ror":"https://ror.org/00mng9617","country_code":"TW","type":"education","lineage":["https://openalex.org/I33096239"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Nung Yang","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Dong Hwa University Shoufeng, Hualien, 974, Taiwan","Department of Computer Science and Information Engineering, National Dong Hwa University Shoufeng, Hualien, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Dong Hwa University Shoufeng, Hualien, 974, Taiwan","institution_ids":["https://openalex.org/I33096239"]},{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Dong Hwa University Shoufeng, Hualien, Taiwan","institution_ids":["https://openalex.org/I33096239"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007853886"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2322,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.52986848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"110","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.9562625885009766},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8113478422164917},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.732889711856842},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.664020299911499},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6378471851348877},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6359816193580627},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5892961025238037},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.525700569152832},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5244534015655518},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44488152861595154},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.3553617000579834},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3269052803516388},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3101997375488281},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19716399908065796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13068392872810364},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12111973762512207},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.07686576247215271}],"concepts":[{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.9562625885009766},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113478422164917},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.732889711856842},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.664020299911499},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6378471851348877},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6359816193580627},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5892961025238037},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.525700569152832},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5244534015655518},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44488152861595154},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3553617000579834},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3269052803516388},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3101997375488281},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19716399908065796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13068392872810364},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12111973762512207},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.07686576247215271},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-55046-1_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-55046-1_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W103635537","https://openalex.org/W122311494","https://openalex.org/W1515272795","https://openalex.org/W1534065037","https://openalex.org/W1575879934","https://openalex.org/W1589946980","https://openalex.org/W1730303865","https://openalex.org/W1977596940","https://openalex.org/W1984492306","https://openalex.org/W1985501247","https://openalex.org/W1988245022","https://openalex.org/W1989417107","https://openalex.org/W2001646724","https://openalex.org/W2016243271","https://openalex.org/W2018978647","https://openalex.org/W2029251894","https://openalex.org/W2034939671","https://openalex.org/W2040990631","https://openalex.org/W2042880349","https://openalex.org/W2046251989","https://openalex.org/W2059444492","https://openalex.org/W2062010115","https://openalex.org/W2071227716","https://openalex.org/W2074685092","https://openalex.org/W2114680656","https://openalex.org/W2119404147","https://openalex.org/W2122975390","https://openalex.org/W2155107565","https://openalex.org/W2158992420","https://openalex.org/W2163400864","https://openalex.org/W2485957127","https://openalex.org/W2497291046","https://openalex.org/W2500040996","https://openalex.org/W2913419753","https://openalex.org/W4237943226","https://openalex.org/W4253746564"],"related_works":["https://openalex.org/W2494410772","https://openalex.org/W4236114117","https://openalex.org/W2249246659","https://openalex.org/W2027570214","https://openalex.org/W2549281079","https://openalex.org/W2032053269","https://openalex.org/W2925147647","https://openalex.org/W1986764789","https://openalex.org/W2565952052","https://openalex.org/W2896010704"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
