{"id":"https://openalex.org/W3107358298","doi":"https://doi.org/10.1155/2020/6627178","title":"On the Value of Order Number and Power in Secret Image Sharing","display_name":"On the Value of Order Number and Power in Secret Image Sharing","publication_year":2020,"publication_date":"2020-11-23","ids":{"openalex":"https://openalex.org/W3107358298","doi":"https://doi.org/10.1155/2020/6627178","mag":"3107358298"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6627178","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6627178","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6627178.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6627178.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041593911","display_name":"Yongqiang Yu","orcid":"https://orcid.org/0000-0001-9778-7783"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongqiang Yu","raw_affiliation_strings":["National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091199678","display_name":"Longlong Li","orcid":"https://orcid.org/0000-0001-7390-3647"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longlong Li","raw_affiliation_strings":["National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089358541","display_name":"Yuliang Lu","orcid":"https://orcid.org/0000-0002-8502-9907"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuliang Lu","raw_affiliation_strings":["National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056431006","display_name":"Xuehu Yan","orcid":"https://orcid.org/0000-0001-6388-1720"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuehu Yan","raw_affiliation_strings":["National University of Defense Technology, Hefei 230037, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Hefei 230037, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056431006"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.4907,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.67082249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.7216587066650391},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7190477252006531},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.6978484392166138},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.665531575679779},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.6382909417152405},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.561808168888092},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.5459098815917969},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.48727476596832275},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.47124820947647095},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4638516902923584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4326637387275696},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40366441011428833},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29971593618392944},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.26918673515319824},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.1666751503944397}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.7216587066650391},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7190477252006531},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.6978484392166138},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.665531575679779},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.6382909417152405},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.561808168888092},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.5459098815917969},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.48727476596832275},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.47124820947647095},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4638516902923584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4326637387275696},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40366441011428833},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29971593618392944},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26918673515319824},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.1666751503944397},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/6627178","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6627178","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6627178.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6791900b9ef04aa7940e59920a18fd56","is_oa":true,"landing_page_url":"https://doaj.org/article/6791900b9ef04aa7940e59920a18fd56","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/6627178","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6627178","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6627178.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3061785442","display_name":null,"funder_award_id":"61602491","funder_id":"https://openalex.org/F4320324150","funder_display_name":"National University of Defense Technology"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4669627473","display_name":null,"funder_award_id":"61602491","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3107358298.pdf","grobid_xml":"https://content.openalex.org/works/W3107358298.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1584591654","https://openalex.org/W1886573485","https://openalex.org/W2011487545","https://openalex.org/W2018562795","https://openalex.org/W2018919412","https://openalex.org/W2040446335","https://openalex.org/W2066699077","https://openalex.org/W2141420453","https://openalex.org/W2592708550","https://openalex.org/W2754768438","https://openalex.org/W2757051818","https://openalex.org/W2775688950","https://openalex.org/W2790634843","https://openalex.org/W2969988050","https://openalex.org/W2970097841","https://openalex.org/W2993516028","https://openalex.org/W3034329490","https://openalex.org/W3088606209","https://openalex.org/W3089493889","https://openalex.org/W3093192035","https://openalex.org/W4300349690","https://openalex.org/W6698135423","https://openalex.org/W6779473996"],"related_works":["https://openalex.org/W2350486768","https://openalex.org/W2164344703","https://openalex.org/W2032053269","https://openalex.org/W2026753506","https://openalex.org/W2573229646","https://openalex.org/W2168248827","https://openalex.org/W2058322292","https://openalex.org/W2162724102","https://openalex.org/W2985786707","https://openalex.org/W3085731999"],"abstract_inverted_index":{"Shadow":[0],"images":[1,129],"generated":[2,130],"from":[3],"Shamir\u2019s":[4,37,39,61,83],"polynomial-based":[5],"secret":[6,14,34,46],"image":[7,15,35,117],"sharing":[8],"(SSIS)":[9],"may":[10],"leak":[11],"the":[12,31,55,67,77,90,97,125,137,141,150,154],"original":[13],"information,":[16],"which":[17,122],"causes":[18],"a":[19],"significant":[20],"risk.":[21],"The":[22,133],"occurrence":[23],"of":[24,33,60,71,79,92,95,99,127,140],"this":[25,73,93,112],"risk":[26],"is":[27,120],"closely":[28],"related":[29],"to":[30,65,161],"basis":[32],"sharing,":[36,47],"polynomial.":[38,62],"polynomial":[40],"plays":[41],"an":[42,114],"essential":[43],"role":[44],"in":[45,82,146],"but":[48],"there":[49],"are":[50],"relatively":[51],"few":[52],"studies":[53,76],"on":[54],"power":[56,103,145,159],"and":[57,69,87,102,144,158],"order":[58,64,85,100,142,156],"number":[59,86,101,143,157],"In":[63,111],"improve":[66],"security":[68,109,126,163],"effectiveness":[70],"SSIS,":[72,147],"paper":[74],"mainly":[75],"utility":[78],"two":[80],"parameters":[81],"polynomial,":[84],"power.":[88],"Through":[89],"research":[91],"kind":[94],"utility,":[96],"choice":[98],"can":[104,123,135,152],"be":[105],"given":[106],"under":[107],"different":[108,162],"requirements.":[110],"process,":[113],"effective":[115],"shadow":[116,128],"evaluation":[118],"algorithm":[119],"proposed,":[121],"measure":[124],"by":[131],"SSIS.":[132],"user":[134,151],"understand":[136],"influence":[138],"rule":[139],"so":[148],"that":[149],"choose":[153],"appropriate":[155],"according":[160],"needs.":[164]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
