{"id":"https://openalex.org/W2141469402","doi":"https://doi.org/10.1109/lsp.2011.2166543","title":"Tagged Visual Cryptography","display_name":"Tagged Visual Cryptography","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2141469402","doi":"https://doi.org/10.1109/lsp.2011.2166543","mag":"2141469402"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2011.2166543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2011.2166543","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002775123","display_name":"Ran-Zan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99908691","display_name":"Yuan Ze University","ror":"https://ror.org/01fv1ds98","country_code":"TW","type":"education","lineage":["https://openalex.org/I99908691"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ran-Zan Wang","raw_affiliation_strings":["Department of Computer Science & Engineering, Yuan-Ze University, Taoyuan, Taiwan","Dept. of Comput. Sci. & Eng., Yuan Ze Univ., Chungli, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Yuan-Ze University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I99908691"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Yuan Ze Univ., Chungli, Taiwan","institution_ids":["https://openalex.org/I99908691"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064404688","display_name":"Shuo-Fang Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I99908691","display_name":"Yuan Ze University","ror":"https://ror.org/01fv1ds98","country_code":"TW","type":"education","lineage":["https://openalex.org/I99908691"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shuo-Fang Hsu","raw_affiliation_strings":["Department of Computer Science & Engineering, Yuan-Ze University, Taoyuan, Taiwan","Dept. of Comput. Sci. & Eng., Yuan Ze Univ., Chungli, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Yuan-Ze University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I99908691"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Eng., Yuan Ze Univ., Chungli, Taiwan","institution_ids":["https://openalex.org/I99908691"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002775123"],"corresponding_institution_ids":["https://openalex.org/I99908691"],"apc_list":null,"apc_paid":null,"fwci":2.8332,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.92605701,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"18","issue":"11","first_page":"627","last_page":"630"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.631992757320404},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5774641633033752},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4435458183288574},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4043526351451874},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3596775233745575}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.631992757320404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5774641633033752},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4435458183288574},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4043526351451874},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3596775233745575}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2011.2166543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2011.2166543","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W103635537","https://openalex.org/W1988245022","https://openalex.org/W2009041676","https://openalex.org/W2016243271","https://openalex.org/W2027570214","https://openalex.org/W2041565771","https://openalex.org/W2046251989","https://openalex.org/W2063453673","https://openalex.org/W2083617759","https://openalex.org/W2093170554","https://openalex.org/W2098374417","https://openalex.org/W2104889998","https://openalex.org/W2107472622","https://openalex.org/W2122975390","https://openalex.org/W2153153350","https://openalex.org/W2159785038","https://openalex.org/W2913419753","https://openalex.org/W4253746564","https://openalex.org/W6604186918","https://openalex.org/W6683978028"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"This":[0],"letter":[1],"presents":[2],"a":[3,48,66],"method":[4],"for":[5],"implementing":[6],"visual":[7,42],"cryptography":[8,43],"(VC)":[9],"in":[10,59,64,178],"which":[11,114],"an":[12,103],"additional":[13],"tag":[14,105],"is":[15,57,101],"attached":[16],"to":[17,127,138,143],"each":[18,112],"generated":[19,146],"share.":[20],"The":[21,131],"proposed":[22,158],"(":[23,159],"<i":[24,28,34,38,60,77,88,160,164],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[25,29,35,39,61,78,89,161,165],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">t</i>":[26,36,79,90,162],",":[27,163],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[30,40,62,166],"),":[31],"2":[32],"\u2264":[33,37],"tagged":[41],"(TVC)":[44],"scheme":[45,51,142],"works":[46],"like":[47],"traditional":[49],"VC":[50,141,173],"does,":[52],"where":[53],"the":[54,69,129,145,157,179],"original":[55],"image":[56],"encoded":[58],"shares":[63,91,147],"such":[65,120],"way":[67],"that":[68,102],"secret":[70,94],"can":[71,106,134],"be":[72,107,136],"revealed":[73,108],"by":[74,109],"superimposing":[75],"any":[76,139],"or":[80,124],"more":[81,149],"shares,":[82],"but":[83],"knowledge":[84],"of":[85,99,156],"less":[86],"than":[87],"gets":[92],"no":[93],"information.":[95],"A":[96],"notable":[97],"characteristic":[98],"TVC":[100,168],"extra":[104],"folding":[110],"up":[111],"share,":[113],"provides":[115],"users":[116],"with":[117,148],"supplementary":[118],"information":[119],"as":[121],"augmented":[122],"message":[123],"distinguishable":[125],"patterns":[126],"identify":[128],"shares.":[130],"tagging":[132],"property":[133],"easily":[135],"applied":[137],"reported":[140],"endow":[144],"capabilities.":[150],"Construction":[151],"methods":[152],"and":[153,174],"simulation":[154],"results":[155],")":[167],"based":[169],"on":[170],"conventional":[171],"matrix-based":[172],"probabilistic-VC":[175],"are":[176],"illustrated":[177],"letter.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
