{"id":"https://openalex.org/W4320733972","doi":"https://doi.org/10.1049/cit2.12164","title":"Privacy\u2010preserving remote sensing images recognition based on limited visual cryptography","display_name":"Privacy\u2010preserving remote sensing images recognition based on limited visual cryptography","publication_year":2023,"publication_date":"2023-02-13","ids":{"openalex":"https://openalex.org/W4320733972","doi":"https://doi.org/10.1049/cit2.12164"},"language":"en","primary_location":{"id":"doi:10.1049/cit2.12164","is_oa":true,"landing_page_url":"https://doi.org/10.1049/cit2.12164","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/cit2.12164","source":{"id":"https://openalex.org/S2898415742","display_name":"CAAI Transactions on Intelligence Technology","issn_l":"2468-2322","issn":["2468-2322","2468-6557"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"CAAI Transactions on Intelligence Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/cit2.12164","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101638181","display_name":"Denghui Zhang","orcid":"https://orcid.org/0000-0002-8452-5925"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Denghui Zhang","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology Guangzhou University  Guangzhou China","Department of New Networks Peng Cheng Laboratory  Shenzhen China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology Guangzhou University  Guangzhou China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Department of New Networks Peng Cheng Laboratory  Shenzhen China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100771200","display_name":"Muhammad Shafiq","orcid":"https://orcid.org/0000-0003-1909-9373"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Muhammad Shafiq","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology Guangzhou University  Guangzhou China","Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology Guangzhou University  Guangzhou China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100636411","display_name":"Liguo Wang","orcid":"https://orcid.org/0000-0001-9373-6233"},"institutions":[{"id":"https://openalex.org/I61565387","display_name":"Dalian Minzu University","ror":"https://ror.org/02hxfx521","country_code":"CN","type":"education","lineage":["https://openalex.org/I61565387"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liguo Wang","raw_affiliation_strings":["College of Information and Communications Engineering Dalian Minzu University  Dalian China","College of Information and Communications Engineering, Dalian Minzu University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communications Engineering Dalian Minzu University  Dalian China","institution_ids":["https://openalex.org/I61565387"]},{"raw_affiliation_string":"College of Information and Communications Engineering, Dalian Minzu University, Dalian, China","institution_ids":["https://openalex.org/I61565387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041541232","display_name":"Gautam Srivastava","orcid":"https://orcid.org/0000-0001-9851-4103"},"institutions":[{"id":"https://openalex.org/I48890080","display_name":"Brandon University","ror":"https://ror.org/02qp25a50","country_code":"CA","type":"education","lineage":["https://openalex.org/I48890080"]},{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"education","lineage":["https://openalex.org/I56306041"]},{"id":"https://openalex.org/I184693016","display_name":"China Medical University","ror":"https://ror.org/00v408z34","country_code":"TW","type":"education","lineage":["https://openalex.org/I184693016"]}],"countries":["CA","LB","TW"],"is_corresponding":false,"raw_author_name":"Gautam Srivastava","raw_affiliation_strings":["Department of Computer Science and Math Lebanese American University  Beirut Lebanon","Department of Mathematics and Computer Science Brandon University  Brandon Manitoba Canada","Research Centre for Interneural Computing China Medical University  Taichung Taiwan China","Department of Computer Science and Math, Lebanese American University, Beirut, Lebanon","Department of Mathematics and Computer Science, Brandon University, Brandon, Manitoba, Canada","Research Centre for Interneural Computing China Medical University Taichung Taiwan China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Math Lebanese American University  Beirut Lebanon","institution_ids":["https://openalex.org/I56306041"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science Brandon University  Brandon Manitoba Canada","institution_ids":["https://openalex.org/I48890080"]},{"raw_affiliation_string":"Research Centre for Interneural Computing China Medical University  Taichung Taiwan China","institution_ids":["https://openalex.org/I184693016"]},{"raw_affiliation_string":"Department of Computer Science and Math, Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Brandon University, Brandon, Manitoba, Canada","institution_ids":["https://openalex.org/I48890080"]},{"raw_affiliation_string":"Research Centre for Interneural Computing China Medical University Taichung Taiwan China","institution_ids":["https://openalex.org/I184693016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041576447","display_name":"Shoulin Yin","orcid":"https://orcid.org/0000-0002-5367-1372"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shoulin Yin","raw_affiliation_strings":["College of Information and Communications Engineering Harbin Engineering University  Harbin China","College of Information and Communications Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communications Engineering Harbin Engineering University  Harbin China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"College of Information and Communications Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100771200"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":4.1644,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.95456773,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"8","issue":"4","first_page":"1166","last_page":"1177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11659","display_name":"Advanced Image Fusion Techniques","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8089861273765564},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7580699920654297},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.6672298312187195},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5838510990142822},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5323202013969421},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4143000543117523},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3584907650947571},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.29962825775146484},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2583422362804413}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8089861273765564},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7580699920654297},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.6672298312187195},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5838510990142822},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5323202013969421},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4143000543117523},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3584907650947571},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.29962825775146484},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2583422362804413},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1049/cit2.12164","is_oa":true,"landing_page_url":"https://doi.org/10.1049/cit2.12164","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/cit2.12164","source":{"id":"https://openalex.org/S2898415742","display_name":"CAAI Transactions on Intelligence Technology","issn_l":"2468-2322","issn":["2468-2322","2468-6557"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"CAAI Transactions on Intelligence Technology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:58097f1ac0ce4ffe8e2861aafd37b166","is_oa":true,"landing_page_url":"https://doaj.org/article/58097f1ac0ce4ffe8e2861aafd37b166","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CAAI Transactions on Intelligence Technology, Vol 8, Iss 4, Pp 1166-1177 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1049/cit2.12164","is_oa":true,"landing_page_url":"https://doi.org/10.1049/cit2.12164","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/cit2.12164","source":{"id":"https://openalex.org/S2898415742","display_name":"CAAI Transactions on Intelligence Technology","issn_l":"2468-2322","issn":["2468-2322","2468-6557"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"CAAI Transactions on Intelligence Technology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5584386892","display_name":null,"funder_award_id":"62250410365","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7424700364","display_name":null,"funder_award_id":"62071084","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4320733972.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1582212933","https://openalex.org/W1958291604","https://openalex.org/W1970259380","https://openalex.org/W1970489192","https://openalex.org/W1980038761","https://openalex.org/W2036145348","https://openalex.org/W2045772684","https://openalex.org/W2064076387","https://openalex.org/W2096733369","https://openalex.org/W2278012135","https://openalex.org/W2412588858","https://openalex.org/W2417429787","https://openalex.org/W2467812764","https://openalex.org/W2508457857","https://openalex.org/W2515344238","https://openalex.org/W2593886839","https://openalex.org/W2604272474","https://openalex.org/W2765793020","https://openalex.org/W2778784613","https://openalex.org/W2801389998","https://openalex.org/W2912918068","https://openalex.org/W2913361479","https://openalex.org/W2947411064","https://openalex.org/W2962700793","https://openalex.org/W2964350391","https://openalex.org/W2972885840","https://openalex.org/W3026797990","https://openalex.org/W3114122837","https://openalex.org/W3139091121","https://openalex.org/W3166176762","https://openalex.org/W3174918241","https://openalex.org/W3181264283","https://openalex.org/W3185553369","https://openalex.org/W3187467329","https://openalex.org/W3206220145","https://openalex.org/W4211001673","https://openalex.org/W4212774754","https://openalex.org/W4228998274","https://openalex.org/W4253746564","https://openalex.org/W4289687823","https://openalex.org/W4295122555","https://openalex.org/W4295414634","https://openalex.org/W4296350429"],"related_works":["https://openalex.org/W2565952052","https://openalex.org/W2896010704","https://openalex.org/W2349124474","https://openalex.org/W2906421360","https://openalex.org/W2802183509","https://openalex.org/W2770854848","https://openalex.org/W2766667873","https://openalex.org/W4237677910","https://openalex.org/W2016928660","https://openalex.org/W4214571442"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,11,20,37,63,69,127,161,178,181,185,191,202,210,226],"arrival":[3],"of":[4,13,22,29,55,66,71,166,193,213],"new":[5],"data":[6],"acquisition":[7],"platforms":[8],"derived":[9],"from":[10,205],"Internet":[12],"Things":[14],"(IoT),":[15],"this":[16,159],"paper":[17],"goes":[18],"beyond":[19],"understanding":[21],"traditional":[23,104],"remote":[24,30,79,153,168,218],"sensing":[25,31,80,154,169,219],"technologies.":[26],"Deep":[27],"fusion":[28],"and":[32,40,57,68,138,163,184],"computer":[33],"vision":[34],"has":[35],"hit":[36],"industrial":[38],"world":[39],"makes":[41],"it":[42],"possible":[43],"to":[44,48,62,83,92,188],"apply":[45],"Artificial":[46],"intelligence":[47],"solve":[49],"problems":[50],"such":[51],"as":[52],"automatic":[53],"extraction":[54],"information":[56],"image":[58],"interpretation.":[59],"However,":[60],"due":[61],"complex":[64],"architecture":[65],"IoT":[67],"lack":[70],"a":[72,94,116],"unified":[73],"security":[74,95],"protection":[75],"mechanism,":[76],"devices":[77,100],"in":[78,101,156,195],"are":[81,107],"vulnerable":[82],"privacy":[84],"leaks":[85],"when":[86,131],"sharing":[87],"data.":[88],"It":[89],"is":[90,115,174,198],"necessary":[91],"design":[93],"scheme":[96,118],"suitable":[97],"for":[98,119,148,151,217],"computation\u2010limited":[99],"IoT,":[102],"since":[103],"encryption":[105,182,215],"methods":[106],"based":[108],"on":[109],"computational":[110],"complexity.":[111],"Visual":[112],"Cryptography":[113],"(VC)":[114],"threshold":[117],"images":[120,155,170,197],"that":[121,225],"can":[122],"be":[123],"decoded":[124],"directly":[125],"by":[126,171],"human":[128],"visual":[129],"system":[130],"superimposing":[132],"encrypted":[133],"images.":[134,220],"The":[135,221],"stacking\u2010to\u2010see":[136],"feature":[137],"simple":[139],"Boolean":[140],"decryption":[141],"operation":[142],"make":[143],"VC":[144,173],"an":[145],"ideal":[146],"solution":[147],"privacy\u2010preserving":[149,229],"recognition":[150,211,230,234],"large\u2010scale":[152,206],"IoT.":[157],"In":[158],"study,":[160],"secure":[162],"efficient":[164],"transmission":[165],"high\u2010resolution":[167],"meaningful":[172],"achieved.":[175],"By":[176,200],"diffusing":[177],"error":[179],"between":[180],"block":[183,187],"original":[186],"adjacent":[189],"blocks,":[190],"degradation":[192],"quality":[194],"recovery":[196],"mitigated.":[199],"fine\u2010tuning":[201],"pre\u2010trained":[203],"model":[204],"datasets,":[207],"we":[208],"improve":[209],"performance":[212,235],"small":[214],"datasets":[216],"experimental":[222],"results":[223],"show":[224],"proposed":[227],"lightweight":[228],"framework":[231],"maintains":[232],"high":[233],"while":[236],"enhancing":[237],"security.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
