{"id":"https://openalex.org/W2155658721","doi":"https://doi.org/10.1109/tcsvt.2013.2280097","title":"Random-Grid-Based Visual Cryptography Schemes","display_name":"Random-Grid-Based Visual Cryptography Schemes","publication_year":2013,"publication_date":"2013-08-29","ids":{"openalex":"https://openalex.org/W2155658721","doi":"https://doi.org/10.1109/tcsvt.2013.2280097","mag":"2155658721"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2013.2280097","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2013.2280097","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110391637","display_name":"Young\u2010Chang Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I107470533","display_name":"Tamkang University","ror":"https://ror.org/04tft4718","country_code":"TW","type":"education","lineage":["https://openalex.org/I107470533"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Young-Chang Hou","raw_affiliation_strings":["Department of Information Management, Tamkang University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Tamkang University, Taipei, Taiwan","institution_ids":["https://openalex.org/I107470533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043043112","display_name":"Shih-Chieh Wei","orcid":"https://orcid.org/0000-0001-7084-2498"},"institutions":[{"id":"https://openalex.org/I107470533","display_name":"Tamkang University","ror":"https://ror.org/04tft4718","country_code":"TW","type":"education","lineage":["https://openalex.org/I107470533"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shih-Chieh Wei","raw_affiliation_strings":["Department of Information Management, Tamkang University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Tamkang University, Taipei, Taiwan","institution_ids":["https://openalex.org/I107470533"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103572950","display_name":"Chia-Yin Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I107470533","display_name":"Tamkang University","ror":"https://ror.org/04tft4718","country_code":"TW","type":"education","lineage":["https://openalex.org/I107470533"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chia-Yin Lin","raw_affiliation_strings":["Department of Information Management, Tamkang University, Taipei, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Tamkang University, Taipei, Taiwan","institution_ids":["https://openalex.org/I107470533"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110391637"],"corresponding_institution_ids":["https://openalex.org/I107470533"],"apc_list":null,"apc_paid":null,"fwci":4.6905,"has_fulltext":false,"cited_by_count":61,"citation_normalized_percentile":{"value":0.95694985,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"24","issue":"5","first_page":"733","last_page":"744"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.9434117078781128},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7219591736793518},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5648271441459656},{"id":"https://openalex.org/keywords/contrast","display_name":"Contrast (vision)","score":0.5599227547645569},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5598552823066711},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5377964973449707},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5163851976394653},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.49005162715911865},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.48045414686203003},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4421972632408142},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.43588393926620483},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.42460793256759644},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32902297377586365},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3255017101764679},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.250510036945343},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2234632670879364}],"concepts":[{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.9434117078781128},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7219591736793518},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5648271441459656},{"id":"https://openalex.org/C2776502983","wikidata":"https://www.wikidata.org/wiki/Q690182","display_name":"Contrast (vision)","level":2,"score":0.5599227547645569},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5598552823066711},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5377964973449707},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5163851976394653},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.49005162715911865},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.48045414686203003},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4421972632408142},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.43588393926620483},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.42460793256759644},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32902297377586365},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3255017101764679},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.250510036945343},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2234632670879364},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcsvt.2013.2280097","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2013.2280097","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},{"id":"pmh:oai:tkuir.lib.tku.edu.tw:987654321/98590","is_oa":false,"landing_page_url":"https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/98590","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W103635537","https://openalex.org/W1977238092","https://openalex.org/W1988245022","https://openalex.org/W1994927113","https://openalex.org/W2016243271","https://openalex.org/W2017586592","https://openalex.org/W2018978647","https://openalex.org/W2029251894","https://openalex.org/W2036145348","https://openalex.org/W2040344223","https://openalex.org/W2040546897","https://openalex.org/W2066545887","https://openalex.org/W2070464844","https://openalex.org/W2094880923","https://openalex.org/W2099884310","https://openalex.org/W2104889998","https://openalex.org/W2149357286","https://openalex.org/W2159785038","https://openalex.org/W2159920946","https://openalex.org/W2165441834","https://openalex.org/W2913419753","https://openalex.org/W6604186918","https://openalex.org/W6758417790"],"related_works":["https://openalex.org/W2494410772","https://openalex.org/W4236114117","https://openalex.org/W2249246659","https://openalex.org/W2027570214","https://openalex.org/W2549281079","https://openalex.org/W2032053269","https://openalex.org/W2925147647","https://openalex.org/W1986764789","https://openalex.org/W2565952052","https://openalex.org/W2896010704"],"abstract_inverted_index":{"This":[0],"paper":[1],"discusses":[2],"a":[3],"random-grid-based":[4],"nonexpanded":[5],"visual":[6,89,106],"cryptography":[7],"scheme":[8],"for":[9],"generating":[10],"both":[11,48,92],"meaningful":[12,105],"and":[13,26,52,96],"noise-like":[14],"shares.":[15],"First,":[16],"the":[17,23,27,44,49,53,69,73,85,88,93,97],"distribution":[18],"of":[19,42,87,91],"black":[20],"pixels":[21],"on":[22],"share":[24,50,94],"images":[25,51,64,95],"stack":[28,54,98],"image":[29,99],"is":[30,36,40,84,110],"analyzed.":[31],"A":[32],"probability":[33],"allocation":[34],"method":[35,109],"then":[37],"proposed":[38],"that":[39],"capable":[41],"producing":[43],"best":[45],"contrast":[46,74],"in":[47,112],"image.":[55],"With":[56],"our":[57],"method,":[58],"not":[59],"only":[60],"can":[61,75],"different":[62],"cover":[63],"be":[65,76,115],"used":[66],"to":[67,100,114,117],"hide":[68],"secret":[70,107],"image,":[71],"but":[72],"adjusted":[77],"as":[78],"needed.":[79],"The":[80],"most":[81],"important":[82],"result":[83],"improvement":[86],"quality":[90],"their":[101],"theoretical":[102],"maximum.":[103],"Our":[104],"sharing":[108],"shown":[111],"experiments":[113],"superior":[116],"past":[118],"methods.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":3}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
