{"id":"https://openalex.org/W2767296618","doi":"https://doi.org/10.4018/ijdcf.2018010103","title":"Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud","display_name":"Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud","publication_year":2017,"publication_date":"2017-11-09","ids":{"openalex":"https://openalex.org/W2767296618","doi":"https://doi.org/10.4018/ijdcf.2018010103","mag":"2767296618"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2018010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2018010103","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100781017","display_name":"Hang Gao","orcid":"https://orcid.org/0000-0001-5206-942X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hang Gao","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048141765","display_name":"Mengting Hu","orcid":"https://orcid.org/0000-0003-1536-5400"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengting Hu","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043735770","display_name":"Tiegang Gao","orcid":"https://orcid.org/0000-0002-3964-2612"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tiegang Gao","raw_affiliation_strings":["College of Software, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Software, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059899281","display_name":"Renhong Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renhong Cheng","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100781017"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":null,"apc_paid":null,"fwci":0.2731,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.64812199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"10","issue":"1","first_page":"24","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7853667736053467},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7463271617889404},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6669019460678101},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.643975019454956},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6230084896087646},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6070556640625},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.587312638759613},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5698460936546326},{"id":"https://openalex.org/keywords/shamirs-secret-sharing","display_name":"Shamir's Secret Sharing","score":0.48287466168403625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4765532612800598},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4364679455757141},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35533371567726135},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3277719020843506},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32383018732070923},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.30671218037605286}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7853667736053467},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7463271617889404},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6669019460678101},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.643975019454956},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6230084896087646},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6070556640625},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.587312638759613},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5698460936546326},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.48287466168403625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4765532612800598},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4364679455757141},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35533371567726135},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3277719020843506},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32383018732070923},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.30671218037605286},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2018010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2018010103","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323993","display_name":"Natural Science Foundation of Tianjin City","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W40480588","https://openalex.org/W106282468","https://openalex.org/W1540447027","https://openalex.org/W1983093940","https://openalex.org/W1984799794","https://openalex.org/W2006831356","https://openalex.org/W2027535936","https://openalex.org/W2030811953","https://openalex.org/W2035781637","https://openalex.org/W2044383346","https://openalex.org/W2047790445","https://openalex.org/W2059059484","https://openalex.org/W2059658630","https://openalex.org/W2087293550","https://openalex.org/W2091280048","https://openalex.org/W2110237702","https://openalex.org/W2121393355","https://openalex.org/W2147929033","https://openalex.org/W2149357286","https://openalex.org/W2154474291","https://openalex.org/W2231218471","https://openalex.org/W2275600489","https://openalex.org/W2295171501","https://openalex.org/W2336376330","https://openalex.org/W2342635042","https://openalex.org/W2400609157","https://openalex.org/W2508093307","https://openalex.org/W2949170220","https://openalex.org/W3122401678","https://openalex.org/W4234192033","https://openalex.org/W4253746564"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W2363629235","https://openalex.org/W2356937512","https://openalex.org/W2391956792","https://openalex.org/W2359201953","https://openalex.org/W2111019861","https://openalex.org/W1474916271","https://openalex.org/W2378395291","https://openalex.org/W2365848551","https://openalex.org/W2110815651"],"abstract_inverted_index":{"A":[0],"novel":[1],"random":[2,79,108],"grid":[3],"and":[4,64,149,163,178,199,214,222],"reversible":[5,43,166],"watermarking":[6,44],"based":[7],"verifiable":[8],"secret":[9,35,39,98,155,176,207],"sharing":[10,115,196],"scheme":[11,170],"for":[12],"outsourcing":[13],"image":[14,36,40,48,61,123,156,208],"in":[15,19,124],"cloud":[16,136,147],"is":[17,49,62,69,101,185,197,209],"proposed":[18,24,169,225],"the":[20,23,30,34,38,56,66,72,89,92,96,106,122,125,127,133,153,174,180,192,195,205,220],"paper.":[21],"In":[22,117],"scheme,":[25],"data":[26],"owner":[27],"firstly":[28],"embeds":[29],"hash":[31,57,67],"value":[32,68,74],"of":[33,58,75,160,165,194,224],"into":[37,51,71],"itself":[41],"using":[42],"algorithm;":[45],"then,":[46],"watermarked":[47],"divided":[50],"$n$":[52,114,134],"sub":[53,60],"image.":[54],"Secondly,":[55],"n":[59,78],"calculated,":[63],"then":[65,150],"transformed":[70],"initial":[73],"hyper-chaos,":[76],"thus":[77],"grids":[80],"are":[81,130,216],"generated":[82,128],"by":[83],"different":[84,135,146],"hyper-chaos.":[85],"Lastly,":[86],"after":[87],"expanding":[88],"sub-image":[90],"to":[91,119,132,186,218],"same":[93],"size":[94],"with":[95,105],"original":[97,154,175,206],"image,":[99,177],"it":[100,188,200],"performer":[102],"XOR":[103],"operation":[104],"corresponding":[107],"grid,":[109],"this":[110],"will":[111],"accordingly":[112],"produce":[113],"secret.":[116],"order":[118],"securely":[120],"outsource":[121],"cloud,":[126],"shares":[129,144],"issued":[131],"server.":[137],"For":[138],"authorized":[139],"user,":[140],"(s)he":[141],"can":[142,151,171,189,201],"get":[143],"from":[145],"server,":[148],"recover":[152],"through":[157],"a":[158],"series":[159],"decryption":[161],"operations":[162],"extraction":[164],"watermarking.":[167],"The":[168],"losslessly":[172],"restore":[173],"have":[179],"double":[181],"verification":[182],"ability,":[183],"that":[184],"say,":[187],"verify":[190,203],"whether":[191,204],"anyone":[193],"modified,":[198],"also":[202],"completely":[210],"reconstructed.":[211],"Some":[212],"analysis":[213],"comparisons":[215],"given":[217],"show":[219],"security":[221],"effectiveness":[223],"scheme.":[226]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
