{"id":"https://openalex.org/W4405397101","doi":"https://doi.org/10.1145/3708547","title":"EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access Structures","display_name":"EVCS-DAS: Evolving Visual Cryptography Schemes for Dynamic Access Structures","publication_year":2024,"publication_date":"2024-12-14","ids":{"openalex":"https://openalex.org/W4405397101","doi":"https://doi.org/10.1145/3708547"},"language":"en","primary_location":{"id":"doi:10.1145/3708547","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3708547","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072460884","display_name":"Xiaotian Wu","orcid":"https://orcid.org/0000-0002-1484-2247"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaotian Wu","raw_affiliation_strings":["Jinan University, Guangzhou, China","College of Cyber Security, College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, China"],"affiliations":[{"raw_affiliation_string":"Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security, College of Information Science and Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089058671","display_name":"Xinjie Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinjie Feng","raw_affiliation_strings":["Jinan University, Guangzhou, China","Department of Computer Science and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, China"],"affiliations":[{"raw_affiliation_string":"Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Department of Computer Science and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101434801","display_name":"Bing Chen","orcid":"https://orcid.org/0000-0002-1716-877X"},"institutions":[{"id":"https://openalex.org/I4210122543","display_name":"Guangdong Polytechnic Normal University","ror":"https://ror.org/02pcb5m77","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210122543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Chen","raw_affiliation_strings":["Guangdong Polytechnic Normal University, Guangzhou, China","School of Cyber Security, Guangdong Polytechnic Normal University, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Polytechnic Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I4210122543"]},{"raw_affiliation_string":"School of Cyber Security, Guangdong Polytechnic Normal University, China","institution_ids":["https://openalex.org/I4210122543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034420945","display_name":"Ching\u2010Nung Yang","orcid":"https://orcid.org/0000-0002-3881-7329"},"institutions":[{"id":"https://openalex.org/I33096239","display_name":"National Dong Hwa University","ror":"https://ror.org/00mng9617","country_code":"TW","type":"education","lineage":["https://openalex.org/I33096239"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ching-Nung Yang","raw_affiliation_strings":["National Dong Hwa University, Shoufeng, Taiwan","Computer Science and Information Engineering, National Dong Hwa University, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Dong Hwa University, Shoufeng, Taiwan","institution_ids":["https://openalex.org/I33096239"]},{"raw_affiliation_string":"Computer Science and Information Engineering, National Dong Hwa University, Taiwan","institution_ids":["https://openalex.org/I33096239"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048949099","display_name":"Q. Y. Peng","orcid":"https://orcid.org/0000-0001-7467-1585"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing-Yu Peng","raw_affiliation_strings":["Jinan University, Guangzhou, China","Department of Computer Science and Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Jinan University, China"],"affiliations":[{"raw_affiliation_string":"Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Department of Computer Science and Sino-French Joint Laboratory for Astrometry, Dynamics and Space Science, Jinan University, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087857252","display_name":"Weiqi Yan","orcid":"https://orcid.org/0000-0002-7443-3285"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Weiqi Yan","raw_affiliation_strings":["School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand","Department of Computer Science, Auckland University of Technology, New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]},{"raw_affiliation_string":"Department of Computer Science, Auckland University of Technology, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072460884"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22498627,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"3","first_page":"1","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7392593622207642},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.6992243528366089},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6786425113677979},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.6649073362350464},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5596106648445129},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5211422443389893},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36242538690567017},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1990365982055664},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1670691967010498},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.14970004558563232}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7392593622207642},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.6992243528366089},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6786425113677979},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.6649073362350464},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5596106648445129},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5211422443389893},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36242538690567017},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1990365982055664},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1670691967010498},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.14970004558563232},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3708547","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3708547","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},{"id":"pmh:oai:openrepository.aut.ac.nz:10292/18486","is_oa":false,"landing_page_url":"http://hdl.handle.net/10292/18486","pdf_url":null,"source":{"id":"https://openalex.org/S4306401809","display_name":"Tuwhera (Auckland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39854758","host_organization_name":"Auckland University of Technology","host_organization_lineage":["https://openalex.org/I39854758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2428307698","display_name":null,"funder_award_id":"2022YFB3103100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3299427955","display_name":null,"funder_award_id":"2022YFE0116800","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5910101215","display_name":null,"funder_award_id":"61972179","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G780788869","display_name":null,"funder_award_id":"62102101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1886573485","https://openalex.org/W1985456457","https://openalex.org/W1986764789","https://openalex.org/W2029251894","https://openalex.org/W2034020304","https://openalex.org/W2047517633","https://openalex.org/W2066545887","https://openalex.org/W2106199204","https://openalex.org/W2133062571","https://openalex.org/W2138392313","https://openalex.org/W2141420453","https://openalex.org/W2172215674","https://openalex.org/W2512984096","https://openalex.org/W2529413871","https://openalex.org/W2550464140","https://openalex.org/W2565498389","https://openalex.org/W2618004641","https://openalex.org/W3022074522","https://openalex.org/W3033602580","https://openalex.org/W3038649929","https://openalex.org/W3088606209","https://openalex.org/W3111746241","https://openalex.org/W3121126693","https://openalex.org/W3135162904","https://openalex.org/W3138178580","https://openalex.org/W3173484368","https://openalex.org/W4213015127","https://openalex.org/W4223965253","https://openalex.org/W4253746564","https://openalex.org/W4289544556","https://openalex.org/W4291653572","https://openalex.org/W4309857258","https://openalex.org/W4312936152","https://openalex.org/W4362500619","https://openalex.org/W4367276775","https://openalex.org/W4367359575","https://openalex.org/W4379116655","https://openalex.org/W4385257690","https://openalex.org/W6758417790"],"related_works":["https://openalex.org/W2896010704","https://openalex.org/W2565952052","https://openalex.org/W2349124474","https://openalex.org/W2906421360","https://openalex.org/W2802183509","https://openalex.org/W2770854848","https://openalex.org/W2766667873","https://openalex.org/W4237677910","https://openalex.org/W2016928660","https://openalex.org/W4214571442"],"abstract_inverted_index":{"A":[0],"systematic":[1],"investigation":[2],"of":[3,37,53,101,106],"evolving":[4,16],"visual":[5,126],"cryptography":[6],"scheme":[7,89],"(EVCS)":[8],"is":[9,63,79,90,117,139,170],"carried":[10],"out":[11],"in":[12,27,152],"this":[13],"article.":[14],"The":[15,172],"scheme,":[17,167],"denoted":[18],"as":[19],"\\((k,\\infty)\\)":[20,77],",":[21,108,110],"differs":[22],"from":[23],"the":[24,41,60,68,73,85,94,125,130,142,149,160,165],"\\((k,n)\\)":[25],"threshold":[26],"that":[28],"it":[29],"permits":[30],"an":[31,87],"arbitrary":[32],"and":[33,98,181,186],"perhaps":[34],"unlimited":[35],"number":[36],"participants.":[38],"More":[39],"importantly,":[40],"access":[42,135],"structure":[43,136],"can":[44,146],"be":[45,179],"updated":[46],"dynamically":[47],"by":[48,66],"adding":[49],"new":[50],"users.":[51],"First":[52],"all,":[54],"a":[55,76,99,133],"preliminary":[56],"implementation":[57],"strategy":[58],"for":[59,119],"\\((2,\\infty)\\)":[61,74],"EVCS":[62,78,102],"introduced.":[64],"Then,":[65],"employing":[67],"\\((2,2)\\)":[69],"VCS":[70,96,156],"recursively":[71],"with":[72,104],"EVCS,":[75],"created.":[80],"In":[81],"order":[82],"to":[83,122,178],"enhance":[84],"performance,":[86],"improved":[88,166],"constructed":[91],"based":[92],"on":[93],"multi-secret":[95,154],"(MVCS)":[97],"series":[100],"schemes":[103],"thresholds":[105],"\\((1,\\infty)\\)":[107],"\\(\\cdots\\)":[109],"\\((k-1,\\infty)\\)":[111],".":[112],"Moreover,":[113],"Boolean":[114],"XOR":[115,131,168],"operation":[116],"adopted":[118],"secret":[120],"recovery":[121],"further":[123],"improve":[124],"quality.":[127],"To":[128],"facilitate":[129],"decryption,":[132],"novel":[134],"partition":[137,144],"algorithm":[138],"presented.":[140],"Additionally,":[141],"proposed":[143,174],"method":[145],"successfully":[147],"solve":[148],"security":[150],"issue":[151],"existing":[153],"XOR-based":[155],"(MXVCS).":[157],"By":[158],"integrating":[159],"more":[161],"secure":[162],"MXVCS":[163],"into":[164],"decryption":[169],"provided.":[171],"two":[173],"methods":[175],"are":[176],"shown":[177],"effective":[180],"advantageous":[182],"through":[183],"extensive":[184],"experiments":[185],"comparisons.":[187]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
