{"id":"https://openalex.org/W7117532440","doi":"https://doi.org/10.1007/s44443-025-00424-5","title":"Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead","display_name":"Secret image sharing with multi-sized shadow images: Balancing concealment and communication overhead","publication_year":2025,"publication_date":"2025-12-30","ids":{"openalex":"https://openalex.org/W7117532440","doi":"https://doi.org/10.1007/s44443-025-00424-5"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00424-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00424-5","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-025-00424-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112146402","display_name":"G L Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guozheng Yang","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rui Wang","orcid":"https://orcid.org/0009-0007-3923-8218"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Wang","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121529248","display_name":"Wei Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yan","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112960652","display_name":"Xuehu Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuehu Yan","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121575656","display_name":"Hao Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Ding","raw_affiliation_strings":["Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"College of Electronic Engineering, National University of Defense Technology, Huangshan Road, 230037, Hefei, Anhui, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112146402"],"corresponding_institution_ids":["https://openalex.org/I143868143","https://openalex.org/I170215575"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.64139101,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8948000073432922,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8948000073432922,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.03550000116229057,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.009600000455975533,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.8335000276565552},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.774399995803833},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6958000063896179},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6381999850273132},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6276000142097473},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.48420000076293945},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4803999960422516},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46860000491142273},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.40529999136924744}],"concepts":[{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.8335000276565552},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.774399995803833},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6958000063896179},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6381999850273132},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6276000142097473},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6022999882698059},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.52920001745224},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.48420000076293945},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4763999879360199},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46860000491142273},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.40529999136924744},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.3490000069141388},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.337799996137619},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3294000029563904},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3292999863624573},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.325300008058548},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.31690001487731934},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.3041999936103821},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2976999878883362},{"id":"https://openalex.org/C113364801","wikidata":"https://www.wikidata.org/wiki/Q26674","display_name":"High fidelity","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C2776326872","wikidata":"https://www.wikidata.org/wiki/Q1192335","display_name":"Shadow mask","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.2581000030040741}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00424-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00424-5","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e8997a77a2f24f6c8af2ba3f9194fb48","is_oa":true,"landing_page_url":"https://doaj.org/article/e8997a77a2f24f6c8af2ba3f9194fb48","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 2 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00424-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00424-5","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5581083297729492,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5374888891","display_name":null,"funder_award_id":"62271496","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6442982633","display_name":null,"funder_award_id":"62401599","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2010843589","https://openalex.org/W2040446335","https://openalex.org/W2070464844","https://openalex.org/W2141420453","https://openalex.org/W2320049148","https://openalex.org/W2487874496","https://openalex.org/W2572732417","https://openalex.org/W2623613632","https://openalex.org/W2901950755","https://openalex.org/W2954834523","https://openalex.org/W2970097841","https://openalex.org/W3034329490","https://openalex.org/W3080137869","https://openalex.org/W3088606209","https://openalex.org/W3098785088","https://openalex.org/W3112483171","https://openalex.org/W3138135684","https://openalex.org/W3138619437","https://openalex.org/W3163262413","https://openalex.org/W4253746564","https://openalex.org/W4282964858","https://openalex.org/W4313597496","https://openalex.org/W4379116655","https://openalex.org/W4382175107","https://openalex.org/W4387910190","https://openalex.org/W4391332798","https://openalex.org/W4399168552","https://openalex.org/W4399568567","https://openalex.org/W4400063894","https://openalex.org/W4401109619","https://openalex.org/W4402084136","https://openalex.org/W4403277318","https://openalex.org/W4405987240","https://openalex.org/W4408941429","https://openalex.org/W4412429375","https://openalex.org/W4412598321"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Secret":[1],"image":[2,17,91,100,110,126],"sharing":[3,101],"(SIS)":[4],"possesses":[5],"advantageous":[6],"attributes":[7],"such":[8],"as":[9,129],"loss":[10],"tolerance,":[11],"offering":[12],"a":[13,46],"promising":[14],"solution":[15],"for":[16],"protection.":[18],"However,":[19],"the":[20,26,29,38,53,63,74,78,96,120,124,130,149,157,168,171],"issue":[21],"remains":[22],"unresolved,":[23],"which":[24],"is":[25,88],"trade-off":[27],"between":[28],"transmission":[30],"or":[31],"storage":[32],"overhead":[33,154],"of":[34,40,72,80,123,132,159,170],"shadow":[35,59,82,105,117,133,141],"images":[36,106,134,142],"and":[37,51,155,164],"concealment":[39,158],"secret":[41,99,109,160],"distribution.":[42,161],"This":[43],"paper":[44],"designs":[45],"novel":[47],"polynomial":[48,65,86],"splitting":[49,62,87],"framework":[50],"proposes":[52],"first":[54,97],"SIS":[55],"scheme":[56,76,102],"with":[57,90,103,119,143],"multi-sized":[58,81,104,116,140],"images.":[60,83],"By":[61],"original":[64,150],"into":[66],"various":[67],"levels":[68],"containing":[69],"different":[70],"numbers":[71],"sub-polynomials,":[73],"proposed":[75,137,172],"enables":[77],"generation":[79],"Moreover,":[84],"since":[85],"compatible":[89],"bit-plane":[92],"decomposition,":[93],"we":[94],"introduce":[95],"progressive":[98],"(PSIS-MS).":[107],"The":[108,136],"can":[111],"be":[112],"recovered":[113,125],"by":[114],"integrating":[115],"images,":[118],"visual":[121],"fidelity":[122],"progressively":[127],"enhancing":[128,156],"quantity":[131],"increases.":[135],"schemes":[138],"generate":[139],"an":[144],"average":[145],"size":[146],"smaller":[147],"than":[148],"image,":[151],"reducing":[152],"communication":[153],"Theoretical":[162],"analysis":[163],"experimental":[165],"comparison":[166],"demonstrate":[167],"validity":[169],"schemes.":[173]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-30T00:00:00"}
