{"id":"https://openalex.org/W4406610528","doi":"https://doi.org/10.1109/tcsvt.2025.3532454","title":"CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic Visual Cryptography Schemes","display_name":"CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic Visual Cryptography Schemes","publication_year":2025,"publication_date":"2025-01-20","ids":{"openalex":"https://openalex.org/W4406610528","doi":"https://doi.org/10.1109/tcsvt.2025.3532454"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2025.3532454","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3532454","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072460884","display_name":"Xiaotian Wu","orcid":"https://orcid.org/0000-0002-1484-2247"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaotian Wu","raw_affiliation_strings":["College of Cyber Security, the College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Cyber Security, College of Information Science and Technology, Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, the College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, College of Information Science and Technology, Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039661451","display_name":"Bofan Song","orcid":"https://orcid.org/0000-0002-1171-8478"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bofan Song","raw_affiliation_strings":["College of Cyber Security, the College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Cyber Security, College of Information Science and Technology, Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, the College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, College of Information Science and Technology, Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101461451","display_name":"Jia Fang","orcid":"https://orcid.org/0009-0006-9111-2375"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Fang","raw_affiliation_strings":["College of Cyber Security, the College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Cyber Security, College of Information Science and Technology, Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, the College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, College of Information Science and Technology, Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101838234","display_name":"Weiqi Yan","orcid":"https://orcid.org/0000-0002-3946-4617"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"WeiQi Yan","raw_affiliation_strings":["Department of Computer and Information Systems, Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Systems, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048949099","display_name":"Q. Y. Peng","orcid":"https://orcid.org/0000-0001-7467-1585"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210127343","display_name":"RS Dynamics (Czechia)","ror":"https://ror.org/029nrcq47","country_code":"CZ","type":"company","lineage":["https://openalex.org/I4210127343"]}],"countries":["CN","CZ"],"is_corresponding":false,"raw_author_name":"Qing-Yu Peng","raw_affiliation_strings":["Department of Computer Science and the Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Jinan University, Guangzhou, China","Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Department of Computer Science, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and the Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210127343"]},{"raw_affiliation_string":"Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Department of Computer Science, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5072460884"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00645941,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"35","issue":"6","first_page":"5501","last_page":"5517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.9231890439987183},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6827883720397949},{"id":"https://openalex.org/keywords/contrast","display_name":"Contrast (vision)","score":0.6645320057868958},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6197519898414612},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5954521298408508},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4856954514980316},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.47868233919143677},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3879457414150238},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35990554094314575},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32108384370803833},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.09558278322219849}],"concepts":[{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.9231890439987183},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6827883720397949},{"id":"https://openalex.org/C2776502983","wikidata":"https://www.wikidata.org/wiki/Q690182","display_name":"Contrast (vision)","level":2,"score":0.6645320057868958},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6197519898414612},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5954521298408508},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4856954514980316},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.47868233919143677},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3879457414150238},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35990554094314575},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32108384370803833},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.09558278322219849}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcsvt.2025.3532454","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3532454","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},{"id":"pmh:oai:openrepository.aut.ac.nz:10292/20049","is_oa":false,"landing_page_url":"http://hdl.handle.net/10292/20049","pdf_url":null,"source":{"id":"https://openalex.org/S4306401809","display_name":"Tuwhera (Auckland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39854758","host_organization_name":"Auckland University of Technology","host_organization_lineage":["https://openalex.org/I39854758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3299427955","display_name":null,"funder_award_id":"2022YFE0116800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G780788869","display_name":null,"funder_award_id":"62102101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G956779315","display_name":null,"funder_award_id":"2023B1212060036","funder_id":"https://openalex.org/F4320328373","funder_display_name":"National Key Laboratory Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320328373","display_name":"National Key Laboratory Foundation of China","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1589946980","https://openalex.org/W1886573485","https://openalex.org/W1997188340","https://openalex.org/W2007942710","https://openalex.org/W2029251894","https://openalex.org/W2034020304","https://openalex.org/W2040446335","https://openalex.org/W2045582747","https://openalex.org/W2089515421","https://openalex.org/W2106199204","https://openalex.org/W2141420453","https://openalex.org/W2153153350","https://openalex.org/W2172215674","https://openalex.org/W2550464140","https://openalex.org/W2565498389","https://openalex.org/W2767380740","https://openalex.org/W2796722686","https://openalex.org/W3033602580","https://openalex.org/W3088606209","https://openalex.org/W3135162904","https://openalex.org/W3138178580","https://openalex.org/W3141913087","https://openalex.org/W3154097682","https://openalex.org/W4213015127","https://openalex.org/W4253746564","https://openalex.org/W4289544556","https://openalex.org/W4291653572","https://openalex.org/W4309857258","https://openalex.org/W4367276775","https://openalex.org/W4378194703","https://openalex.org/W4381327733","https://openalex.org/W4385257690","https://openalex.org/W4385607309","https://openalex.org/W4388996902","https://openalex.org/W4391317070","https://openalex.org/W4391332798","https://openalex.org/W4399168552"],"related_works":["https://openalex.org/W2489253992","https://openalex.org/W2896010704","https://openalex.org/W2565952052","https://openalex.org/W2349124474","https://openalex.org/W2906421360","https://openalex.org/W2802183509","https://openalex.org/W2770854848","https://openalex.org/W2766667873","https://openalex.org/W4237677910","https://openalex.org/W2016928660"],"abstract_inverted_index":{"Most":[0],"visual":[1,133,163],"cryptography":[2],"schemes":[3],"(VCSs)":[4],"are":[5,62,152,171],"condition-oriented":[6],"which":[7],"implies":[8],"their":[9],"designs":[10],"focus":[11],"on":[12,88],"satisfying":[13],"the":[14,41,70,124,132,135,156,174],"contrast":[15],"and":[16,109,150,158,167],"security":[17],"conditions":[18],"in":[19,74],"VCS.":[20],"In":[21],"this":[22],"paper,":[23],"we":[24],"explore":[25],"a":[26,65,83,89,99,116],"new":[27,55],"architecture":[28],"of":[29,43,53,85],"VCS:":[30],"contrast-oriented":[31,39],"region-based":[32,76,105],"progressive":[33,77],"probabilistic":[34,100],"VCS":[35,78,101],"(CRP2-VCS).":[36],"The":[37,94],"term":[38],"indicates":[40],"optimality":[42],"multi-contrast":[44,107],"is":[45,68,92,97,120,138],"taken":[46],"into":[47],"consideration":[48],"when":[49],"producing":[50],"shadows.":[51],"First":[52],"all,":[54],"requirements":[56],"for":[57,145],"CRP2-VCS,":[58],"described":[59],"by":[60,173],"probabilities,":[61],"introduced.":[63],"As":[64],"non-interference":[66],"requirement":[67],"proposed,":[69],"secret":[71],"interference":[72],"problem":[73,96],"existing":[75],"can":[79],"be":[80],"avoided.":[81],"Then,":[82],"construction":[84],"CRP2-VCS":[86],"based":[87,118],"multi-contrast-maximizing":[90,95],"model":[91,102],"provided.":[93],"essentially":[98],"that":[103],"fuses":[104],"sharing,":[106],"optimization,":[108],"general":[110],"access":[111],"structure":[112],"(GAS)":[113],"together.":[114],"Finally,":[115],"Max-Min":[117],"technique":[119],"adopted":[121],"to":[122,129,140,154],"solve":[123],"multi-objective":[125],"optimization":[126],"problem.":[127],"Moreover,":[128],"further":[130],"boost":[131],"quality,":[134,164],"proposed":[136,175],"method":[137],"extended":[139],"allow":[141],"employing":[142],"XOR":[143],"operation":[144],"image":[146],"recovery.":[147],"Experimental":[148],"results":[149],"comparisons":[151],"demonstrated":[153],"show":[155],"effectiveness":[157],"advantages,":[159],"such":[160],"as":[161],"optimal":[162],"non-expansible":[165],"shadow":[166],"GAS":[168],"sharing":[169],"policy,":[170],"provided":[172],"technique.":[176]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
