{"id":"https://openalex.org/W2123729652","doi":"https://doi.org/10.1109/tifs.2009.2034203","title":"Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques","display_name":"Self-Verifying Visual Secret Sharing Using Error Diffusion and Interpolation Techniques","publication_year":2009,"publication_date":"2009-10-09","ids":{"openalex":"https://openalex.org/W2123729652","doi":"https://doi.org/10.1109/tifs.2009.2034203","mag":"2123729652"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2009.2034203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2009.2034203","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University FCU, Taichung, Taiwan","[Dept. of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan]"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University FCU, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"[Dept. of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan]","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058313652","display_name":"Chia\u2010Chen Lin","orcid":"https://orcid.org/0000-0003-4480-7351"},"institutions":[{"id":"https://openalex.org/I177918364","display_name":"Providence University","ror":"https://ror.org/03fcpsq87","country_code":"TW","type":"education","lineage":["https://openalex.org/I177918364"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chia-Chen Lin","raw_affiliation_strings":["Department of Computer Science and Information Management, Providence University, Taichung, Taiwan","Dept. of Comput. Sci. & Inf. Manage., Providence Univ., Taichung, , Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Management, Providence University, Taichung, Taiwan","institution_ids":["https://openalex.org/I177918364"]},{"raw_affiliation_string":"Dept. of Comput. Sci. & Inf. Manage., Providence Univ., Taichung, , Taiwan","institution_ids":["https://openalex.org/I177918364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023725893","display_name":"Ngan Le","orcid":"https://orcid.org/0000-0003-2571-0511"},"institutions":[{"id":"https://openalex.org/I23582244","display_name":"Ho Chi Minh City University of Science","ror":"https://ror.org/05jfbgm49","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023","https://openalex.org/I23582244"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"T.H.N. Le","raw_affiliation_strings":["Department of Computer Science, Natural Science University, Vietnam","Dept. of Comput. Sci., Natural Sci. Univ., Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Natural Science University, Vietnam","institution_ids":[]},{"raw_affiliation_string":"Dept. of Comput. Sci., Natural Sci. Univ., Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I23582244"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112425145","display_name":"Ho\u00e0i B\u1eafc L\u00ea","orcid":null},"institutions":[{"id":"https://openalex.org/I23582244","display_name":"Ho Chi Minh City University of Science","ror":"https://ror.org/05jfbgm49","country_code":"VN","type":"education","lineage":["https://openalex.org/I123565023","https://openalex.org/I23582244"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Hoai Bac Le","raw_affiliation_strings":["Department of Computer Science, Natural Science University, Vietnam","Dept. of Comput. Sci., Natural Sci. Univ., Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Natural Science University, Vietnam","institution_ids":[]},{"raw_affiliation_string":"Dept. of Comput. Sci., Natural Sci. Univ., Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I23582244"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038550838"],"corresponding_institution_ids":["https://openalex.org/I4880106"],"apc_list":null,"apc_paid":null,"fwci":0.6471,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.72416152,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"4","issue":"4","first_page":"790","last_page":"801"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7248915433883667},{"id":"https://openalex.org/keywords/halftone","display_name":"Halftone","score":0.6305965185165405},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.6038802862167358},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5884184837341309},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5714158415794373},{"id":"https://openalex.org/keywords/interpolation","display_name":"Interpolation (computer graphics)","score":0.5623194575309753},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5044034719467163},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.45518985390663147},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.4458402991294861},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.41676095128059387},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3095838129520416},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2254643738269806}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7248915433883667},{"id":"https://openalex.org/C2777635815","wikidata":"https://www.wikidata.org/wiki/Q1110021","display_name":"Halftone","level":3,"score":0.6305965185165405},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.6038802862167358},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5884184837341309},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5714158415794373},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.5623194575309753},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5044034719467163},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.45518985390663147},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.4458402991294861},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.41676095128059387},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3095838129520416},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2254643738269806}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2009.2034203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2009.2034203","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1530550845","https://openalex.org/W1804617257","https://openalex.org/W1966103472","https://openalex.org/W1980911770","https://openalex.org/W1989752251","https://openalex.org/W1998841980","https://openalex.org/W2016928660","https://openalex.org/W2024288803","https://openalex.org/W2029251894","https://openalex.org/W2037238744","https://openalex.org/W2040446335","https://openalex.org/W2057283796","https://openalex.org/W2067306608","https://openalex.org/W2071059056","https://openalex.org/W2075587349","https://openalex.org/W2085274816","https://openalex.org/W2107270044","https://openalex.org/W2121668943","https://openalex.org/W2135708552","https://openalex.org/W2136694848","https://openalex.org/W2158992420"],"related_works":["https://openalex.org/W196726375","https://openalex.org/W2078094010","https://openalex.org/W2549188609","https://openalex.org/W2518618054","https://openalex.org/W2054307499","https://openalex.org/W2740050303","https://openalex.org/W3174818576","https://openalex.org/W187355919","https://openalex.org/W2002137011","https://openalex.org/W2166964969"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5,9,44,110],"novel":[6],"scheme":[7,26,108,145],"called":[8],"self-verifying":[10],"visual":[11],"secret":[12,50,80,119,130,165,170],"sharing":[13],"scheme,":[14],"which":[15],"can":[16,172],"be":[17,35,173],"applied":[18],"to":[19,34,47],"both":[20],"grayscale":[21],"and":[22,68,77,91,113,177,206],"color":[23],"images.":[24,30],"This":[25],"uses":[27],"two":[28],"halftone":[29,141],"The":[31,52],"first,":[32],"considered":[33],"the":[36,48,56,61,66,73,78,118,122,128,139,143,152,155,163,168],"host":[37,62],"image,":[38],"is":[39,58,109,132],"created":[40],"by":[41,64,84,106],"directly":[42],"applying":[43],"halftoning":[45],"technique":[46],"original":[49],"image.":[51,120,166],"other,":[53],"regarded":[54],"as":[55,160,162],"logo,":[57,142],"generated":[59,83,105],"from":[60],"image":[63,81,112,131,171,203],"exploiting":[65],"interpolation":[67],"error":[69,201],"diffusion":[70],"techniques.":[71],"Because":[72],"set":[74,156],"of":[75,127,154,157,184],"shadows":[76,159,189],"reconstructed":[79,129,164,169],"are":[82],"simple":[85],"Boolean":[86],"operations,":[87],"no":[88,92],"computational":[89],"complexity":[90],"pixel":[93],"expansion":[94],"occur":[95],"in":[96],"our":[97,107,195],"scheme.":[98],"Experimental":[99],"results":[100],"confirm":[101],"that":[102],"each":[103],"shadow":[104],"noise-like":[111],"eight":[114],"times":[115],"smaller":[116],"than":[117,134],"Moreover,":[121],"peak":[123],"signal-to-noise":[124],"ratio":[125],"value":[126],"larger":[133],"33":[135],"dB.":[136],"Based":[137],"on":[138],"extracted":[140],"proposed":[144],"provides":[146],"an":[147],"effective":[148],"solution":[149],"for":[150],"verifying":[151],"reliability":[153],"collected":[158],"well":[161],"Furthermore,":[167],"established":[174],"completely":[175],"if":[176,179],"only":[178],"<i":[180,185],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[181,186],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>":[182],"out":[183],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</i>":[187],"valid":[188],"have":[190],"been":[191],"collected.":[192],"To":[193],"achieve":[194],"objectives,":[196],"four":[197],"techniques":[198],"were":[199],"adopted:":[200],"diffusion,":[202],"clustering,":[204],"interpolation,":[205],"inverse":[207],"halftoning-based":[208],"edge":[209],"detection.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
