{"id":"https://openalex.org/W4289544556","doi":"https://doi.org/10.1145/3550275","title":"Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square","display_name":"Improved Random Grid-based Cheating Prevention Visual Cryptography Using Latin Square","publication_year":2022,"publication_date":"2022-08-03","ids":{"openalex":"https://openalex.org/W4289544556","doi":"https://doi.org/10.1145/3550275"},"language":"en","primary_location":{"id":"doi:10.1145/3550275","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3550275","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035925564","display_name":"Sophie C. C. Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I193524592","display_name":"Tianjin University of Finance and Economics","ror":"https://ror.org/05ev1jb90","country_code":"CN","type":"education","lineage":["https://openalex.org/I193524592"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sophie C. C. Sun","raw_affiliation_strings":["Department of Mathematics, Tianjin University of Finance and Economics, Tianjin, P.R. China"],"raw_orcid":"https://orcid.org/0000-0001-6483-1098","affiliations":[{"raw_affiliation_string":"Department of Mathematics, Tianjin University of Finance and Economics, Tianjin, P.R. China","institution_ids":["https://openalex.org/I193524592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061975844","display_name":"Yongkang Zhao","orcid":"https://orcid.org/0000-0002-0542-1088"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongkang Zhao","raw_affiliation_strings":["The Chern institute of Mathematics and LPMC, Nankai University, Tianjin, P.R. China"],"raw_orcid":"https://orcid.org/0000-0002-0542-1088","affiliations":[{"raw_affiliation_string":"The Chern institute of Mathematics and LPMC, Nankai University, Tianjin, P.R. China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063946169","display_name":"Fang\u2010Wei Fu","orcid":"https://orcid.org/0000-0002-9696-8977"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang-Wei Fu","raw_affiliation_strings":["The Chern institute of Mathematics and LPMC, Nankai University, Tianjin, P.R. China"],"raw_orcid":"https://orcid.org/0000-0002-9696-8977","affiliations":[{"raw_affiliation_string":"The Chern institute of Mathematics and LPMC, Nankai University, Tianjin, P.R. China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063008488","display_name":"Yawei Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yawei Ren","raw_affiliation_strings":["School of Information Management, Beijing Information Science and Technology University, Beijing, P.R. China and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China"],"raw_orcid":"https://orcid.org/0000-0002-5635-6749","affiliations":[{"raw_affiliation_string":"School of Information Management, Beijing Information Science and Technology University, Beijing, P.R. China and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I78675632","https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035925564"],"corresponding_institution_ids":["https://openalex.org/I193524592"],"apc_list":null,"apc_paid":null,"fwci":0.8163,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.72952976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"19","issue":"2s","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.8595959544181824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6472529768943787},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6262433528900146},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.596723735332489},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5389706492424011},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5156984925270081},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5051725506782532},{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.5015637874603271},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.48920154571533203},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.47049403190612793},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4641462564468384},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.45981723070144653},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4450991749763489},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.3457193970680237},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.294275164604187},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24809575080871582},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07484498620033264}],"concepts":[{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.8595959544181824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6472529768943787},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6262433528900146},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.596723735332489},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5389706492424011},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5156984925270081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5051725506782532},{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.5015637874603271},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.48920154571533203},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.47049403190612793},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4641462564468384},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.45981723070144653},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4450991749763489},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3457193970680237},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.294275164604187},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24809575080871582},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07484498620033264},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3550275","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3550275","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3407674300","display_name":null,"funder_award_id":"20JCZDJC00610","funder_id":"https://openalex.org/F4320323993","funder_display_name":"Natural Science Foundation of Tianjin City"},{"id":"https://openalex.org/G3783197144","display_name":null,"funder_award_id":"12141108, 61971243","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8366370340","display_name":null,"funder_award_id":"12001398","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323993","display_name":"Natural Science Foundation of Tianjin City","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1605647140","https://openalex.org/W1886573485","https://openalex.org/W1984799794","https://openalex.org/W2011357954","https://openalex.org/W2040546897","https://openalex.org/W2062764108","https://openalex.org/W2067306608","https://openalex.org/W2070464844","https://openalex.org/W2072708289","https://openalex.org/W2108101328","https://openalex.org/W2149357286","https://openalex.org/W2520898925","https://openalex.org/W2752783791","https://openalex.org/W2889053133","https://openalex.org/W3093192035","https://openalex.org/W4206626953"],"related_works":["https://openalex.org/W2925147647","https://openalex.org/W1596090937","https://openalex.org/W2494410772","https://openalex.org/W4236114117","https://openalex.org/W2249246659","https://openalex.org/W2027570214","https://openalex.org/W2549281079","https://openalex.org/W2032053269","https://openalex.org/W1986764789","https://openalex.org/W2404057798"],"abstract_inverted_index":{"Visual":[0],"cryptography":[1,40],"scheme":[2,41,72,124],"is":[3,73],"a":[4,69],"method":[5],"of":[6,54,59,106,154],"encrypting":[7],"secret":[8,15,127],"image":[9,16,128],"into":[10,86],"n":[11,119],"noiselike":[12],"shares.":[13,23],"The":[14],"can":[17],"be":[18],"reconstructed":[19],"by":[20,63,129],"stacking":[21],"adequate":[22],"In":[24],"the":[25,36,52,57,79,87,99,103,122,126,133,150,155],"past":[26],"two":[27],"decades,":[28],"many":[29],"schemes":[30],"have":[31,136],"been":[32],"proposed":[33,156],"to":[34,77,148],"realize":[35],"cheating":[37],"prevention":[38],"visual":[39],"(CPVCS).":[42],"Significantly,":[43],"Ren":[44],"et":[45],"al.":[46],"[":[47],"9":[48],"]":[49],"first":[50],"introduced":[51],"idea":[53],"CPVCS":[55],"with":[56],"help":[58],"Latin":[60],"square.":[61],"Inspired":[62],"their":[64],"work,":[65],"in":[66,92,102],"this":[67],"article,":[68],"new":[70],"reliable":[71],"proposed.":[74],"More":[75],"precisely,":[76],"facilitate":[78],"certification":[80],"process,":[81],"we":[82,97],"embed":[83],"meaningful":[84],"characters":[85],"randomly":[88],"chosen":[89],"authentication":[90],"patterns":[91],"each":[93],"divided":[94],"blocks.":[95],"Furthermore,":[96],"fix":[98],"security":[100,153],"vulnerability":[101],"stacked":[104],"results":[105,145],"share":[107],"S":[108],"g":[109,113,117],"and":[110,143,152],"verification":[111],"Ver":[112],",":[114],"where":[115],"1\u2264":[116],"\u2264":[118],".":[120],"Since":[121],"improved":[123],"encrypts":[125],"utilizing":[130],"random":[131],"grids,":[132],"generated":[134],"shares":[135],"no":[137],"pixel":[138],"expansion.":[139],"Finally,":[140],"theoretical":[141],"analysis":[142],"experimental":[144],"are":[146],"conducted":[147],"evaluate":[149],"efficiency":[151],"scheme.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
