{"id":"https://openalex.org/W4392931423","doi":"https://doi.org/10.1109/icassp48485.2024.10445965","title":"DSIS: A Novel (K,N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery","display_name":"DSIS: A Novel (K,N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery","publication_year":2024,"publication_date":"2024-03-18","ids":{"openalex":"https://openalex.org/W4392931423","doi":"https://doi.org/10.1109/icassp48485.2024.10445965"},"language":"en","primary_location":{"id":"doi:10.1109/icassp48485.2024.10445965","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icassp48485.2024.10445965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109726685","display_name":"Zikai Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zikai Xu","raw_affiliation_strings":["University of Science and Technology of China,Hefei,China","University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395493","display_name":"Bin Liu","orcid":"https://orcid.org/0000-0002-3977-8800"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Liu","raw_affiliation_strings":["University of Science and Technology of China,Hefei,China","University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101520454","display_name":"Fei Hu","orcid":"https://orcid.org/0000-0002-2308-437X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Hu","raw_affiliation_strings":["University of Science and Technology of China,Hefei,China","University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102001334","display_name":"Weihai Li","orcid":"https://orcid.org/0000-0002-4023-8385"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weihai Li","raw_affiliation_strings":["University of Science and Technology of China,Hefei,China","University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064573190","display_name":"Nenghai Yu","orcid":"https://orcid.org/0000-0003-4417-9316"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["University of Science and Technology of China,Hefei,China","University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5109726685"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02672217,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3720","last_page":"3724"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6982225179672241},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6886271238327026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.655422568321228},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.651390790939331},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.5803295373916626},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5772519111633301},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.5570055842399597},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.5115888714790344},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.500302791595459},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49513664841651917},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.47892627120018005},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.43852877616882324},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.434418648481369},{"id":"https://openalex.org/keywords/secure-channel","display_name":"Secure channel","score":0.4235060214996338},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35809236764907837},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18820419907569885},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13209092617034912},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.07575652003288269}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6982225179672241},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6886271238327026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.655422568321228},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.651390790939331},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.5803295373916626},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5772519111633301},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.5570055842399597},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.5115888714790344},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.500302791595459},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49513664841651917},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.47892627120018005},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.43852877616882324},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.434418648481369},{"id":"https://openalex.org/C180073179","wikidata":"https://www.wikidata.org/wiki/Q3304359","display_name":"Secure channel","level":3,"score":0.4235060214996338},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35809236764907837},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18820419907569885},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13209092617034912},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.07575652003288269},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp48485.2024.10445965","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icassp48485.2024.10445965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4099999964237213,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G5498667710","display_name":null,"funder_award_id":"2022YFB3103203","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2040446335","https://openalex.org/W2070464844","https://openalex.org/W2129270830","https://openalex.org/W2141420453","https://openalex.org/W2487874496","https://openalex.org/W2755498902","https://openalex.org/W2886490696","https://openalex.org/W2942970338","https://openalex.org/W3045939081","https://openalex.org/W3112483171","https://openalex.org/W3138135684","https://openalex.org/W3163262413","https://openalex.org/W3173484368","https://openalex.org/W4206100086","https://openalex.org/W4213282415","https://openalex.org/W4214573097","https://openalex.org/W4220714597","https://openalex.org/W4253746564","https://openalex.org/W4292166932"],"related_works":["https://openalex.org/W2032053269","https://openalex.org/W2350486768","https://openalex.org/W2401408573","https://openalex.org/W2026753506","https://openalex.org/W2573229646","https://openalex.org/W2985786707","https://openalex.org/W3007445677","https://openalex.org/W2487874496","https://openalex.org/W2385947223","https://openalex.org/W2090150892"],"abstract_inverted_index":{"Secret":[0],"image":[1,77,82,132,154,168],"sharing":[2,66,109],"(SIS)":[3],"schemes":[4,20],"have":[5,122],"undergone":[6],"significant":[7],"development.":[8],"However,":[9],"to":[10,36,51,55,78,90,117,125,169],"the":[11,18,23,53,67,72,76,92,113,119,123,127,130,138,141,156,171],"best":[12],"of":[13,17,75,115,140],"our":[14,145],"knowledge,":[15],"none":[16],"existing":[19],"has":[21],"considered":[22],"deniable":[24,61],"property":[25],"during":[26],"secret":[27,38,54,68,73,102,110,142,153,158],"sharing.":[28],"This":[29,104],"presents":[30],"a":[31,60,80,152],"problem":[32],"when":[33,176],"we":[34,47,58,70,87,121,149,162],"need":[35],"share":[37],"images":[39],"through":[40],"an":[41,97],"untrusted":[42],"and":[43,173],"supervised":[44],"channel,":[45],"where":[46],"may":[48],"be":[49],"coerced":[50],"reveal":[52,118],"adversary.":[56],"Here":[57],"propose":[59],"SIS":[62,89],"(DSIS)":[63],"scheme.":[64],"Before":[65],"image,":[69,94],"manipulate":[71],"area":[74,143],"create":[79],"forged":[81,93,131],"that":[83],"possesses":[84],"deniability.":[85],"Then":[86],"employ":[88],"distribute":[91],"while":[95,161],"generating":[96],"auxiliary":[98],"matrix":[99,105],"derived":[100],"from":[101],"key.":[103],"governs":[106],"rules":[107],"for":[108],"area.":[111],"In":[112,147],"event":[114],"coercion":[116],"secret,":[120],"capability":[124],"present":[126],"adversary":[128],"with":[129,155],"instead,":[133],"thereby":[134],"retaining":[135],"control":[136],"over":[137],"disclosure":[139],"at":[144],"discretion.":[146],"DSIS,":[148],"can":[150,163],"obtain":[151],"small-sized":[157],"key":[159],"losslessly,":[160],"recover":[164],"another":[165],"visually-meaningful":[166],"fake":[167],"safeguard":[170],"secrecy":[172],"protect":[174],"ourselves":[175],"facing":[177],"coercion.":[178]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
