{"id":"https://openalex.org/W3083143460","doi":"https://doi.org/10.1109/access.2020.3021522","title":"Size-Invariant Visual Cryptography With Improved Perceptual Quality for Grayscale Image","display_name":"Size-Invariant Visual Cryptography With Improved Perceptual Quality for Grayscale Image","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3083143460","doi":"https://doi.org/10.1109/access.2020.3021522","mag":"3083143460"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3021522","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3021522","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186114.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186114.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103062649","display_name":"Rui Sun","orcid":"https://orcid.org/0000-0003-4342-7103"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rui Sun","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005848828","display_name":"Zhengxin Fu","orcid":"https://orcid.org/0000-0001-8587-0942"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhengxin Fu","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100659382","display_name":"Bin Yu","orcid":"https://orcid.org/0000-0003-1999-7413"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bin Yu","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103062649"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.5892,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.69450729,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":null,"first_page":"163394","last_page":"163404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11165","display_name":"Image and Video Quality Assessment","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11019","display_name":"Image Enhancement Techniques","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/halftone","display_name":"Halftone","score":0.9372060894966125},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.8682761788368225},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.669635534286499},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.634651243686676},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6127290725708008},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5976071953773499},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.5847362279891968},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5307450294494629},{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.5124185681343079},{"id":"https://openalex.org/keywords/binary-image","display_name":"Binary image","score":0.4668484330177307},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.45220398902893066},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.45138388872146606},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42905062437057495},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3267189562320709},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.32634902000427246},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.27321749925613403},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.25287526845932007},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.24712690711021423}],"concepts":[{"id":"https://openalex.org/C2777635815","wikidata":"https://www.wikidata.org/wiki/Q1110021","display_name":"Halftone","level":3,"score":0.9372060894966125},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.8682761788368225},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.669635534286499},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.634651243686676},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6127290725708008},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5976071953773499},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.5847362279891968},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5307450294494629},{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.5124185681343079},{"id":"https://openalex.org/C193828747","wikidata":"https://www.wikidata.org/wiki/Q864118","display_name":"Binary image","level":4,"score":0.4668484330177307},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45220398902893066},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.45138388872146606},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42905062437057495},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3267189562320709},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32634902000427246},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.27321749925613403},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25287526845932007},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.24712690711021423},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3021522","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3021522","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186114.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:569ac3ef33ca4cc38db7491987605b25","is_oa":true,"landing_page_url":"https://doaj.org/article/569ac3ef33ca4cc38db7491987605b25","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 163394-163404 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3021522","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3021522","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186114.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7034644147","display_name":null,"funder_award_id":"61602513","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3083143460.pdf","grobid_xml":"https://content.openalex.org/works/W3083143460.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W103635537","https://openalex.org/W1580389772","https://openalex.org/W1589946980","https://openalex.org/W2014559896","https://openalex.org/W2016243271","https://openalex.org/W2029251894","https://openalex.org/W2039626203","https://openalex.org/W2040546897","https://openalex.org/W2041565771","https://openalex.org/W2045582747","https://openalex.org/W2054307499","https://openalex.org/W2062764108","https://openalex.org/W2075587349","https://openalex.org/W2104802120","https://openalex.org/W2119404147","https://openalex.org/W2121867848","https://openalex.org/W2133665775","https://openalex.org/W2149357286","https://openalex.org/W2189344795","https://openalex.org/W2208958634","https://openalex.org/W2275257283","https://openalex.org/W2376561135","https://openalex.org/W2592285041","https://openalex.org/W2790818085","https://openalex.org/W2793461027","https://openalex.org/W2889053133","https://openalex.org/W2896822250","https://openalex.org/W2930605643","https://openalex.org/W3011676662","https://openalex.org/W6604186918","https://openalex.org/W6675816385","https://openalex.org/W6749086177","https://openalex.org/W6754196400","https://openalex.org/W6758417790"],"related_works":["https://openalex.org/W2384183398","https://openalex.org/W196726375","https://openalex.org/W2078094010","https://openalex.org/W2549188609","https://openalex.org/W2054307499","https://openalex.org/W187355919","https://openalex.org/W2740050303","https://openalex.org/W3174818576","https://openalex.org/W1534065037","https://openalex.org/W2002137011"],"abstract_inverted_index":{"The":[0],"reconstructed":[1,97,108],"image":[2,17,40,53,65,98,109,115],"of":[3,15,22,106],"the":[4,13,20,26,31,38,68,77,85,95,104,107,114,122,126,133,140],"size-invariant":[5,60],"visual":[6],"cryptography":[7],"(VC)":[8],"is":[9,82,99,117,129,136,146],"inevitably":[10],"accompanied":[11],"by":[12,47,67],"loss":[14],"secret":[16],"information":[18,116],"and":[19,92,150],"degradation":[21],"perceptual":[23],"quality.":[24],"Here,":[25],"halftone":[27,54,87],"technique":[28],"comes":[29],"to":[30,121],"forefront":[32],"since":[33],"it":[34],"can":[35],"realistically":[36],"simulate":[37],"grayscale":[39,52,64],"from":[41],"a":[42,59],"discrete":[43],"binary":[44,71],"image.":[45],"Thus,":[46],"combining":[48],"VC":[49,61,80],"sharing":[50,81],"with":[51,110],"technique,":[55],"this":[56],"paper":[57],"proposes":[58],"scheme":[62,135],"for":[63],"underpinned":[66],"efficient":[69],"direct":[70],"search":[72],"(EDBS)":[73],"algorithm,":[74],"in":[75,125],"which":[76],"multi-pixel":[78],"encryption":[79],"adopted":[83],"into":[84],"EDBS":[86],"process.":[88],"Through":[89],"local":[90],"optimizations":[91],"global":[93],"iterations,":[94],"optimal":[96],"obtained.":[100],"To":[101],"further":[102],"enhance":[103],"contrast":[105],"limited":[111],"computational":[112],"power,":[113],"probabilistically":[118],"extracted":[119],"according":[120],"inverse":[123],"mapping":[124],"codebook.":[127],"It":[128],"theoretically":[130],"proved":[131],"that":[132],"proposed":[134],"as":[137,139],"secure":[138],"traditional":[141],"VC,":[142],"while":[143],"its":[144],"effectiveness":[145],"validated":[147],"through":[148],"experiments":[149],"comparative":[151],"analyses.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
