{"id":"https://openalex.org/W2049601056","doi":"https://doi.org/10.1093/comjnl/bxu105","title":"Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion","display_name":"Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion","publication_year":2014,"publication_date":"2014-11-11","ids":{"openalex":"https://openalex.org/W2049601056","doi":"https://doi.org/10.1093/comjnl/bxu105","mag":"2049601056"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxu105","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxu105","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111751484","display_name":"Chao-Liang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I184693016","display_name":"China Medical University","ror":"https://ror.org/00v408z34","country_code":"TW","type":"education","lineage":["https://openalex.org/I184693016"]},{"id":"https://openalex.org/I4210126829","display_name":"China Medical University Hospital","ror":"https://ror.org/0368s4g32","country_code":"TW","type":"healthcare","lineage":["https://openalex.org/I4210126829"]},{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chao-Liang Liu","raw_affiliation_strings":["Department of Applied Informatics and Multimedia, Asia University, Lioufeng Rd., Wufeng, Taichung, Taiwan, Republic of China","Department of Medical Research, China Medical University Hospital, China Medical University Taichung, Taiwan, Republic of China","1Department of Applied Informatics and Multimedia, Asia University, Lioufeng Rd., Wufeng, Taichung, Taiwan, Republic of China","2Department of Medical Research, China Medical University Hospital, China Medical University Taichung, Taiwan, Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Applied Informatics and Multimedia, Asia University, Lioufeng Rd., Wufeng, Taichung, Taiwan, Republic of China","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"Department of Medical Research, China Medical University Hospital, China Medical University Taichung, Taiwan, Republic of China","institution_ids":["https://openalex.org/I184693016","https://openalex.org/I4210126829"]},{"raw_affiliation_string":"1Department of Applied Informatics and Multimedia, Asia University, Lioufeng Rd., Wufeng, Taichung, Taiwan, Republic of China","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"2Department of Medical Research, China Medical University Hospital, China Medical University Taichung, Taiwan, Republic of China","institution_ids":["https://openalex.org/I184693016","https://openalex.org/I4210126829"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111751485","display_name":"Wang-Jui Tsai","orcid":null},"institutions":[{"id":"https://openalex.org/I70522481","display_name":"National Changhua University of Education","ror":"https://ror.org/005gkfa10","country_code":"TW","type":"education","lineage":["https://openalex.org/I70522481"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wang-Jui Tsai","raw_affiliation_strings":["Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","3Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","institution_ids":["https://openalex.org/I70522481"]},{"raw_affiliation_string":"3Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","institution_ids":["https://openalex.org/I70522481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111956590","display_name":"Ting\u2010Yi Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I70522481","display_name":"National Changhua University of Education","ror":"https://ror.org/005gkfa10","country_code":"TW","type":"education","lineage":["https://openalex.org/I70522481"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ting-Yi Chang","raw_affiliation_strings":["3Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China"],"affiliations":[{"raw_affiliation_string":"3Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","institution_ids":["https://openalex.org/I70522481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110705397","display_name":"Chun-Cheng Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I126145234","display_name":"Chaoyang University of Technology","ror":"https://ror.org/04xwksx09","country_code":"TW","type":"education","lineage":["https://openalex.org/I126145234"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chun-Cheng Peng","raw_affiliation_strings":["Department of Information and Communication Engineering, Chaoyang University of Technology, Jifeng E. Rd., Wufeng District, Taichung, Taiwan, Republic of China","4Department of Information and Communication Engineering, Chaoyang University of Technology, Jifeng E. Rd., Wufeng District, Taichung, Taiwan, Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Chaoyang University of Technology, Jifeng E. Rd., Wufeng District, Taichung, Taiwan, Republic of China","institution_ids":["https://openalex.org/I126145234"]},{"raw_affiliation_string":"4Department of Information and Communication Engineering, Chaoyang University of Technology, Jifeng E. Rd., Wufeng District, Taichung, Taiwan, Republic of China","institution_ids":["https://openalex.org/I126145234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056153029","display_name":"Peng-Shiang Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I70522481","display_name":"National Changhua University of Education","ror":"https://ror.org/005gkfa10","country_code":"TW","type":"education","lineage":["https://openalex.org/I70522481"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Peng-Shiang Wong","raw_affiliation_strings":["Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","3Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","institution_ids":["https://openalex.org/I70522481"]},{"raw_affiliation_string":"3Department of Industrial Education and Technology, National Changhua University of Education, No.1, Jin-De Road, Changhua City, Taiwan, Republic of China","institution_ids":["https://openalex.org/I70522481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111751484"],"corresponding_institution_ids":["https://openalex.org/I143578492","https://openalex.org/I184693016","https://openalex.org/I4210126829"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.2439,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.58872125,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"58","issue":"7","first_page":"1598","last_page":"1606"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.92649245262146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7089406251907349},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.6918978095054626},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.6519986391067505},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6452240347862244},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6159235835075378},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.5680489540100098},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5606215000152588},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5494909286499023},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.4886201024055481},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4568920135498047},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4480144679546356},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3817117214202881},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2670259475708008},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25315678119659424},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.07972720265388489}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.92649245262146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7089406251907349},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.6918978095054626},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.6519986391067505},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6452240347862244},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6159235835075378},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.5680489540100098},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5606215000152588},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5494909286499023},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.4886201024055481},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4568920135498047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4480144679546356},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3817117214202881},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2670259475708008},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25315678119659424},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.07972720265388489},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxu105","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxu105","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2032053269","https://openalex.org/W2768332800","https://openalex.org/W2083084382","https://openalex.org/W2006088653","https://openalex.org/W3162150040","https://openalex.org/W2899963024","https://openalex.org/W2741120563","https://openalex.org/W2025440986","https://openalex.org/W3007445677","https://openalex.org/W2394437290"],"abstract_inverted_index":{"In":[0],"(k,n)-threshold":[1],"visual":[2],"secret":[3,8,22,28,56,76,134,151,161],"sharing":[4,152],"(VSS)":[5],"schemes,":[6,172],"the":[7,43,62,82,104,114,120],"holder":[9],"can":[10,58,73,94],"base":[11],"a":[12],"group":[13],"of":[14,65,103],"n":[15,18],"participants":[16],"with":[17,36,168],"shares":[19,41,106,116,129,138,157],"to":[20,52,122,132,140,158],"reconstruct":[21],"message":[23],"by":[24,88,97,125],"stacking":[25,99],"shares.":[26,66],"The":[27,92,136],"messages":[29],"are":[30,117],"identified":[31],"directly":[32,98],"without":[33,78],"any":[34],"computation":[35],"only":[37],"k(k\u2264n)":[38],"or":[39],"more":[40,55,176],"using":[42],"human":[44],"eye.":[45],"Recently,":[46],"many":[47],"researchers":[48],"have":[49],"devoted":[50],"themselves":[51],"studying":[53],"how":[54],"images":[57,77,162],"be":[59,95],"encrypted":[60],"into":[61],"same":[63],"quantity":[64],"An":[67],"extended":[68],"random-grid":[69],"VSS":[70,171],"scheme":[71,85,153],"that":[72,154],"embed":[74,159],"four":[75],"pixel":[79],"expansion":[80],"under":[81],"(2,2)-visual":[83,150],"secret-sharing":[84],"was":[86],"proposed":[87],"Chen":[89],"et":[90],"al.":[91],"secrets":[93],"recovered":[96],"and":[100,110,130,179],"rotating":[101],"one":[102],"two":[105,164],"at":[107,127],"90\u00b0,":[108],"180\u00b0":[109],"270\u00b0,":[111],"respectively.":[112],"However,":[113],"used":[115],"meaningless,":[118],"causing":[119],"attacker":[121],"become":[123],"doubtful":[124],"looking":[126],"meaningless":[128,137],"trying":[131],"steal":[133],"messages.":[135],"lead":[139],"difficult":[141],"encryption":[142],"management.":[143],"This":[144],"paper":[145],"proposes":[146],"an":[147],"improved":[148],"black-and-white":[149],"adapts":[155],"square":[156],"three":[160],"via":[163],"camouflaged":[165],"images.":[166],"Compared":[167],"other":[169],"related":[170],"this":[173],"technique":[174],"has":[175],"flexibility,":[177],"efficiency":[178],"security.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
