{"id":"https://openalex.org/W2994013622","doi":"https://doi.org/10.1109/icawst.2019.8923462","title":"Fault-Tolerant Visual Secret Sharing Scheme Using Meaningful Shares","display_name":"Fault-Tolerant Visual Secret Sharing Scheme Using Meaningful Shares","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2994013622","doi":"https://doi.org/10.1109/icawst.2019.8923462","mag":"2994013622"},"language":"en","primary_location":{"id":"doi:10.1109/icawst.2019.8923462","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icawst.2019.8923462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103177570","display_name":"Yu-Chun Chung","orcid":"https://orcid.org/0000-0003-4604-3623"},"institutions":[{"id":"https://openalex.org/I193365169","display_name":"National Chi Nan University","ror":"https://ror.org/03ha6v181","country_code":"TW","type":"education","lineage":["https://openalex.org/I193365169"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yu-Chun Chung","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chi Nan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chi Nan University, Taiwan","institution_ids":["https://openalex.org/I193365169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035331594","display_name":"Jia-Hao Ou","orcid":null},"institutions":[{"id":"https://openalex.org/I193365169","display_name":"National Chi Nan University","ror":"https://ror.org/03ha6v181","country_code":"TW","type":"education","lineage":["https://openalex.org/I193365169"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jia-Hao Ou","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chi Nan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chi Nan University, Taiwan","institution_ids":["https://openalex.org/I193365169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036652639","display_name":"Justie Su-Tzu Juan","orcid":"https://orcid.org/0000-0002-3654-2560"},"institutions":[{"id":"https://openalex.org/I193365169","display_name":"National Chi Nan University","ror":"https://ror.org/03ha6v181","country_code":"TW","type":"education","lineage":["https://openalex.org/I193365169"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Justie Su-Tzu Juan","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Chi Nan University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Chi Nan University, Taiwan","institution_ids":["https://openalex.org/I193365169"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103177570"],"corresponding_institution_ids":["https://openalex.org/I193365169"],"apc_list":null,"apc_paid":null,"fwci":0.2024,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55644118,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8147163391113281},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.777792751789093},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7049821615219116},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.617411732673645},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.5620898604393005},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5334717631340027},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5166121125221252},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5149072408676147},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.4902186989784241},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4145553410053253},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2866126298904419},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2687968909740448},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.17092126607894897},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12571850419044495},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10989448428153992},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09299987554550171}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8147163391113281},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.777792751789093},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7049821615219116},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.617411732673645},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5620898604393005},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5334717631340027},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5166121125221252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5149072408676147},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.4902186989784241},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4145553410053253},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2866126298904419},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2687968909740448},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.17092126607894897},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12571850419044495},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10989448428153992},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09299987554550171},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icawst.2019.8923462","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icawst.2019.8923462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W192265493","https://openalex.org/W2007764359","https://openalex.org/W2049601056","https://openalex.org/W2066699077","https://openalex.org/W2070464844","https://openalex.org/W2072789122","https://openalex.org/W2149357286","https://openalex.org/W2165441834","https://openalex.org/W2239339901","https://openalex.org/W2314899820","https://openalex.org/W2998342181","https://openalex.org/W6607780541","https://openalex.org/W6772367679"],"related_works":["https://openalex.org/W2006088653","https://openalex.org/W2768332800","https://openalex.org/W2357909631","https://openalex.org/W2363629235","https://openalex.org/W1557783852","https://openalex.org/W2032053269","https://openalex.org/W2348427614","https://openalex.org/W2356937512","https://openalex.org/W2083084382","https://openalex.org/W2353139179"],"abstract_inverted_index":{"Security":[0],"problem":[1],"is":[2,26,37,49,67,71],"becoming":[3],"increasingly":[4],"crucial":[5],"in":[6,44],"many":[7],"fields.":[8],"In":[9,84],"order":[10],"to":[11,27,74],"ensure":[12],"that":[13],"secret":[14,33,47,82,90,112],"images":[15],"are":[16],"not":[17,72],"being":[18],"stolen":[19],"during":[20],"information":[21],"transmission,":[22],"a":[23,38,46,68,89],"preferred":[24],"way":[25],"encrypt":[28,110],"them":[29],"before":[30],"transmission.":[31],"Visual":[32],"sharing":[34],"scheme":[35,39],"(VSSS)":[36],"of":[40],"secure":[41],"communication":[42],"technology":[43],"which":[45,70,109],"image":[48,91,113],"encrypted":[50],"into":[51,92,114],"some":[52],"shares":[53,62,77,95],"and":[54,118],"then":[55],"restored":[56],"through":[57],"human":[58],"vision":[59],"by":[60],"stacking":[61],"directly.":[63],"A":[64],"fault-tolerant":[65,121],"VSSS":[66,69,108],"necessary":[73],"align":[75],"the":[76,81,85,98,120],"precisely":[78],"when":[79],"recovering":[80],"image.":[83],"other":[86],"side,":[87],"encrypting":[88],"two":[93,105,115],"meaningless":[94],"might":[96],"invite":[97],"attacker's":[99],"attention.":[100],"Therefore,":[101],"this":[102],"paper":[103],"proposed":[104],"fault-":[106],"tolerant":[107],"one":[111],"meaningful":[116],"shares,":[117],"with":[119],"mechanism.":[122]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
