{"id":"https://openalex.org/W7108223037","doi":"https://doi.org/10.1109/tcsvt.2025.3639108","title":"Robust Secret Image Sharing Against Malicious Shadow Images by Reusing Polynomial Coefficients With Hash Function","display_name":"Robust Secret Image Sharing Against Malicious Shadow Images by Reusing Polynomial Coefficients With Hash Function","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7108223037","doi":"https://doi.org/10.1109/tcsvt.2025.3639108"},"language":null,"primary_location":{"id":"doi:10.1109/tcsvt.2025.3639108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3639108","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Lizhi Xiong","orcid":"https://orcid.org/0000-0003-1604-7690"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lizhi Xiong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-1604-7690","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Siqi Wang","orcid":"https://orcid.org/0009-0002-7439-4674"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siqi Wang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0002-7439-4674","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ching-Nung Yang","orcid":"https://orcid.org/0000-0002-3881-7329"},"institutions":[{"id":"https://openalex.org/I33096239","display_name":"National Dong Hwa University","ror":"https://ror.org/00mng9617","country_code":"TW","type":"education","lineage":["https://openalex.org/I33096239"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Nung Yang","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan"],"raw_orcid":"https://orcid.org/0000-0002-3881-7329","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan","institution_ids":["https://openalex.org/I33096239"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhangjie Fu","orcid":"https://orcid.org/0000-0002-4363-2521"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhangjie Fu","raw_affiliation_strings":["School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-4363-2521","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":null,"display_name":"Chunqiang Yu","orcid":"https://orcid.org/0000-0002-7221-0168"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunqiang Yu","raw_affiliation_strings":["Key Laboratory of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China"],"raw_orcid":"https://orcid.org/0000-0002-7221-0168","affiliations":[{"raw_affiliation_string":"Key Laboratory of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I200845125"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.573067,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"36","issue":"4","first_page":"4800","last_page":"4813"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.6552000045776367,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.6552000045776367,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.22519999742507935,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.0364999994635582,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6933000087738037},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.6834999918937683},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6656000018119812},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4787999987602234},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.46709999442100525},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.44920000433921814},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.44190001487731934},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.4018000066280365},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.38989999890327454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7296000123023987},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6933000087738037},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.6834999918937683},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6656000018119812},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4787999987602234},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.46709999442100525},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.44920000433921814},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.44190001487731934},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40610000491142273},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.4018000066280365},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.38989999890327454},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3855000138282776},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.3695000112056732},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.361299991607666},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3594000041484833},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.35429999232292175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.353300005197525},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.3440999984741211},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C141379421","wikidata":"https://www.wikidata.org/wiki/Q6094427","display_name":"Iterative reconstruction","level":2,"score":0.326200008392334},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3237999975681305},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3068999946117401},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.29980000853538513},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.2858000099658966},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.2842000126838684},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2842000126838684}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2025.3639108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3639108","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5152480602264404,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G7464343989","display_name":null,"funder_award_id":"62172233","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8296653632","display_name":null,"funder_award_id":"62472231","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"a":[1,11],"(<italic":[2],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[3,18,34,47,84],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k,":[4],"n</i>)-threshold":[5],"secret":[6,12,89],"image":[7,13,90,210],"sharing":[8,91],"(SIS)":[9],"scheme,":[10],"is":[14],"encoded":[15],"into":[16],"<italic":[17,33,46,83],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[19],"shadow":[20,37,49,61,132,146,182],"images":[21,50,62,133,183],"and":[22,73,148,195,208,214],"distributed":[23],"to":[24,45,51,65,78,97,168,202,225],"the":[25,80,112,157,177,180,198,218],"corresponding":[26],"participants,":[27],"enabling":[28],"lossless":[29],"reconstruction":[30,109],"with":[31,138,156],"any":[32],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>":[35,85],"correct":[36],"images.":[38],"This":[39,191],"inherent":[40],"fault":[41],"tolerance":[42],"allows":[43],"up":[44],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n\u2013k</i>":[48],"be":[52],"lost":[53],"or":[54,69],"corrupted.":[55],"However,":[56,171],"in":[57,108,118,187],"real-world":[58],"scenarios,":[59],"all":[60],"are":[63,175],"susceptible":[64],"malicious":[66,131,145],"tampering,":[67],"cropping,":[68],"noise":[70],"during":[71],"transmission":[72],"storage,":[74],"making":[75],"it":[76],"difficult":[77],"guarantee":[79],"availability":[81],"of":[82,159,179],"intact":[86],"shadows.":[87],"Robust":[88],"(RSIS)":[92],"schemes":[93],"have":[94],"been":[95],"proposed":[96,199,219],"address":[98,122],"this":[99],"issue,":[100],"yet":[101],"existing":[102,226],"methods":[103],"often":[104],"suffer":[105],"significant":[106],"degradation":[107],"quality":[110],"as":[111,172],"attack":[113],"strength":[114],"increases,":[115],"revealing":[116],"limitations":[117],"their":[119],"robustness.":[120],"To":[121],"these":[123],"issues,":[124],"we":[125],"propose":[126],"an":[127],"RSIS":[128],"scheme":[129,200,220],"against":[130],"by":[134],"Reusing":[135],"Polynomial":[136],"Coefficients":[137],"hash":[139],"function":[140],"(RSIS-RPC),":[141],"which":[142],"provides":[143,165],"both":[144],"detection":[147],"error":[149],"correction":[150,153],"capabilities.":[151],"The":[152],"capability":[154],"improves":[155],"degree":[158],"coefficient":[160],"reuse,":[161],"where":[162],"greater":[163],"reuse":[164],"stronger":[166],"resilience":[167],"pixel":[169],"corruption.":[170],"more":[173],"coefficients":[174],"reused,":[176],"size":[178],"generated":[181],"increases":[184],"correspondingly,":[185],"resulting":[186],"higher":[188],"storage":[189],"requirements.":[190],"trade-off":[192],"between":[193],"robustness":[194,223],"efficiency":[196],"makes":[197],"adaptable":[201],"diverse":[203],"application":[204],"scenarios":[205],"requiring":[206],"secure":[207],"resilient":[209],"sharing.":[211],"Experimental":[212],"results":[213],"analyses":[215],"demonstrate":[216],"that":[217],"achieves":[221],"superior":[222],"compared":[224],"schemes.":[227]},"counts_by_year":[],"updated_date":"2026-04-07T06:01:17.266235","created_date":"2025-12-03T00:00:00"}
