{"id":"https://openalex.org/W2074685092","doi":"https://doi.org/10.1049/iet-ifs:20080066","title":"Colour visual cryptography schemes","display_name":"Colour visual cryptography schemes","publication_year":2008,"publication_date":"2008-12-06","ids":{"openalex":"https://openalex.org/W2074685092","doi":"https://doi.org/10.1049/iet-ifs:20080066","mag":"2074685092"},"language":"en","primary_location":{"id":"doi:10.1049/iet-ifs:20080066","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs:20080066","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111260168","display_name":"F. Liu","orcid":"https://orcid.org/0009-0006-5897-4141"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"F. Liu","raw_affiliation_strings":["The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, People's Republic of China","Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, People's Republic of China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101611531","display_name":"Changchun Wu","orcid":"https://orcid.org/0000-0002-9823-6630"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"C.K. Wu","raw_affiliation_strings":["The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, People's Republic of China","Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100190, People's Republic of China","institution_ids":["https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102762857","display_name":"Xiaojing Lin","orcid":"https://orcid.org/0000-0001-6052-4234"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"X.J. Lin","raw_affiliation_strings":["Computer Science and Technology, Ocean University of China, Qingdao, 266100, People's Republic of China","Ocean University of China"],"affiliations":[{"raw_affiliation_string":"Computer Science and Technology, Ocean University of China, Qingdao, 266100, People's Republic of China","institution_ids":["https://openalex.org/I59028903"]},{"raw_affiliation_string":"Ocean University of China","institution_ids":["https://openalex.org/I59028903"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111260168"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":null,"fwci":4.5655,"has_fulltext":false,"cited_by_count":98,"citation_normalized_percentile":{"value":0.94932219,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2","issue":"4","first_page":"151","last_page":"165"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.9353501200675964},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6685622930526733},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5919497013092041},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5261159539222717},{"id":"https://openalex.org/keywords/neural-cryptography","display_name":"Neural cryptography","score":0.5245980620384216},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4963722825050354},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47069859504699707},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4406786859035492},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.43369171023368835},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.4128771126270294},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4086132049560547},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.327592670917511},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.23304876685142517},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2091071903705597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12499067187309265}],"concepts":[{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.9353501200675964},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6685622930526733},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5919497013092041},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5261159539222717},{"id":"https://openalex.org/C126954023","wikidata":"https://www.wikidata.org/wiki/Q4316440","display_name":"Neural cryptography","level":4,"score":0.5245980620384216},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4963722825050354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47069859504699707},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4406786859035492},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.43369171023368835},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.4128771126270294},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4086132049560547},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.327592670917511},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.23304876685142517},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2091071903705597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12499067187309265},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1049/iet-ifs:20080066","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs:20080066","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W103635537","https://openalex.org/W632063504","https://openalex.org/W1503874213","https://openalex.org/W1510240164","https://openalex.org/W1512565410","https://openalex.org/W1720024462","https://openalex.org/W1988245022","https://openalex.org/W1989752251","https://openalex.org/W2020390204","https://openalex.org/W2029251894","https://openalex.org/W2046251989","https://openalex.org/W2059444492","https://openalex.org/W2063453673","https://openalex.org/W2122975390","https://openalex.org/W2133850979","https://openalex.org/W2165425172","https://openalex.org/W2913419753","https://openalex.org/W4210675070"],"related_works":["https://openalex.org/W2032053269","https://openalex.org/W2115094454","https://openalex.org/W2565952052","https://openalex.org/W134264063","https://openalex.org/W2349124474","https://openalex.org/W2605707247","https://openalex.org/W2549281079","https://openalex.org/W2906421360","https://openalex.org/W2802183509","https://openalex.org/W2400535148"],"abstract_inverted_index":{"Visual":[0],"cryptography":[1,46,52,64,81,97,104,145,172],"scheme":[2,9,32,98,211],"(VCS)":[3],"is":[4,33],"a":[5,15,31,74,92,129,136,159,164],"kind":[6],"of":[7,14,29,37,45,62,83,106,117,147,174,184,203],"secret-sharing":[8],"which":[10,175],"allows":[11],"the":[12,35,38,43,59,79,102,113,126,143,151,156,169,176,180,200,204,209,216],"encryption":[13],"secret":[16,39],"image":[17,40],"into":[18],"n":[19,25],"shares":[20],"that":[21,116,183],"are":[22,179],"distributed":[23],"to":[24],"participants.":[26],"The":[27,71,196],"beauty":[28],"such":[30],"that,":[34],"decryption":[36],"requires":[41],"neither":[42],"knowledge":[44],"nor":[47],"complex":[48],"computation.":[49],"Colour":[50],"visual":[51,63,80,96,103,144,171],"becomes":[53],"an":[54],"interesting":[55],"research":[56],"topic":[57],"after":[58],"formal":[60],"introduction":[61],"by":[65],"Naor":[66,84,107],"and":[67,85,91,108,121,131,135,138,153,163,188,192,207],"Shamir":[68,86,109],"in":[69,215],"1995.":[70],"authors":[72,127,157,197],"propose":[73,128,158],"colour":[75,93,160,165],"(k,":[76,94,123,133,140,161,166,190,193],"n)-VCS":[77,134,162,191],"under":[78,101,142,168],"model":[82,105,146],"with":[87,110,212],"no":[88],"pixel":[89,111,177],"expansion,":[90],"n)-extended":[95],"((k,":[99],"n)-EVCS)":[100],"expansion":[112],"same":[114,170,181],"as":[115,182],"its":[118],"corresponding":[119,186],"black":[120,130,137,152,187],"white":[122,132,139,154,189],"n)-EVCS.":[124],"Furthermore,":[125],"n)-EVCS":[141,167],"Tuyls.":[148],"Based":[149],"on":[150],"schemes,":[155,206],"model,":[173],"expansions":[178],"their":[185],"n)-EVCS,":[194],"respectively.":[195],"also":[198],"give":[199],"experimental":[201],"results":[202],"proposed":[205,210],"compare":[208],"known":[213],"schemes":[214],"literature.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
