Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2018-06-19

AUTHORS

Lintao Liu, Yuliang Lu, Xuehu Yan

ABSTRACT

In comparison with traditional secret image sharing (SIS), extended secret image sharing (ESIS) can encrypt the secret image into several meaningful shadow images rather than noise-like shares, which both decrease enemies’ suspects and make them more manageable for participants. However, a majority of current ESISs are based on a combination between SIS and steganography, which result in the limited performance such as the small capacity of secret information and the large cost for decryption. In this paper, we propose a (k, n) threshold extended polynomial-based ESIS, namely EPSIS, completely based on Shamir’s classic PSIS without the help of steganography. Firstly, novel concepts, such as the sharing map and sharing pool, are defined to reconstruct the sharing and recovery phases of PSIS; secondly, the secret image and halftone binary cover images act on the sharing phase to generate meaningful grayscale shares from the novel view of PSIS based on the sharing map; finally, in order to achieve the same effects but without the huge sharing map, a filtering procedure for appropriate shared values is added into the sharing phase of natural PSIS, which aims to make the most significant bit of pixel in each share equal to bit in corresponding binary cover. In comparison with current ESISs, the proposed EPSIS not only has advantages in the traditional properties, such (k, n) threshold, capacity, visual quality and computational cost, but also owns two unique properties about covers, including no restrictive requirements on the selection of covers and reversible recovery of cover with the single related share. These significant properties are beneficial for searchable encryption in the area of cloud storage. Furthermore, the security condition of the proposed EPSIS is discussed in detail, and then simulations are provided to verify the security and effectiveness. More... »

PAGES

1265-1287

References to SciGraph publications

  • 2010. A Comprehensive Study of Visual Cryptography in TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY V
  • 1995. Visual cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'94
  • 2016-04-22. Secret sharing: using meaningful image shadows based on Gray code in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2015-10-27. An enhanced threshold visual secret sharing based on random grids in JOURNAL OF REAL-TIME IMAGE PROCESSING
  • 2016-08-19. Reversible secret image sharing scheme in encrypted images in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2016-10-13. A novel mapping-based lossless recovery algorithm for VSS in JOURNAL OF REAL-TIME IMAGE PROCESSING
  • 2016-03-14. A secure image sharing scheme with high quality stego-images based on steganography in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2017-09-21. A novel lossless recovery algorithm for basic matrix-based VSS in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2016-07-21. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography in JOURNAL OF REAL-TIME IMAGE PROCESSING
  • 2016-10-04. Perfect contrast XOR-based visual cryptography schemes via linear algebra in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2014. Visual Cryptography for Image Processing and Security, Theory, Methods, and Applications in NONE
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11042-018-6202-3

    DOI

    http://dx.doi.org/10.1007/s11042-018-6202-3

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1104898116


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Lintao", 
            "id": "sg:person.013517427271.32", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013517427271.32"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lu", 
            "givenName": "Yuliang", 
            "id": "sg:person.015112370271.93", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yan", 
            "givenName": "Xuehu", 
            "id": "sg:person.010467364517.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s11554-016-0621-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009229081", 
              "https://doi.org/10.1007/s11554-016-0621-z"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-016-3429-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027214688", 
              "https://doi.org/10.1007/s11042-016-3429-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-016-3535-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026122719", 
              "https://doi.org/10.1007/s11042-016-3535-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-017-5215-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1091893616", 
              "https://doi.org/10.1007/s11042-017-5215-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11554-016-0644-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016948860", 
              "https://doi.org/10.1007/s11554-016-0644-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11554-015-0540-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022432477", 
              "https://doi.org/10.1007/s11554-015-0540-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-09644-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024582239", 
              "https://doi.org/10.1007/978-3-319-09644-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-016-3844-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041425795", 
              "https://doi.org/10.1007/s11042-016-3844-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14298-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050017989", 
              "https://doi.org/10.1007/978-3-642-14298-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0053419", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008839066", 
              "https://doi.org/10.1007/bfb0053419"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-016-0285-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030004022", 
              "https://doi.org/10.1007/s10623-016-0285-5"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018-06-19", 
        "datePublishedReg": "2018-06-19", 
        "description": "In comparison with traditional secret image sharing (SIS), extended secret image sharing (ESIS) can encrypt the secret image into several meaningful shadow images rather than noise-like shares, which both decrease enemies\u2019 suspects and make them more manageable for participants. However, a majority of current ESISs are based on a combination between SIS and steganography, which result in the limited performance such as the small capacity of secret information and the large cost for decryption. In this paper, we propose a (k, n) threshold extended polynomial-based ESIS, namely EPSIS, completely based on Shamir\u2019s classic PSIS without the help of steganography. Firstly, novel concepts, such as the sharing map and sharing pool, are defined to reconstruct the sharing and recovery phases of PSIS; secondly, the secret image and halftone binary cover images act on the sharing phase to generate meaningful grayscale shares from the novel view of PSIS based on the sharing map; finally, in order to achieve the same effects but without the huge sharing map, a filtering procedure for appropriate shared values is added into the sharing phase of natural PSIS, which aims to make the most significant bit of pixel in each share equal to bit in corresponding binary cover. In comparison with current ESISs, the proposed EPSIS not only has advantages in the traditional properties, such (k, n) threshold, capacity, visual quality and computational cost, but also owns two unique properties about covers, including no restrictive requirements on the selection of covers and reversible recovery of cover with the single related share. These significant properties are beneficial for searchable encryption in the area of cloud storage. Furthermore, the security condition of the proposed EPSIS is discussed in detail, and then simulations are provided to verify the security and effectiveness.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11042-018-6202-3", 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.8304044", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1044869", 
            "issn": [
              "1380-7501", 
              "1573-7721"
            ], 
            "name": "Multimedia Tools and Applications", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "78"
          }
        ], 
        "keywords": [
          "secret image sharing", 
          "secret image", 
          "image sharing", 
          "sharing phase", 
          "secret image sharing scheme", 
          "help of steganography", 
          "noise-like shares", 
          "meaningful shadow images", 
          "image sharing scheme", 
          "searchable encryption", 
          "cloud storage", 
          "secret information", 
          "cover image", 
          "sharing scheme", 
          "visual quality", 
          "significant bits", 
          "shadow images", 
          "computational cost", 
          "security conditions", 
          "steganography", 
          "sharing", 
          "novel view", 
          "limited performance", 
          "EPSIS", 
          "images", 
          "traditional properties", 
          "novel concept", 
          "encryption", 
          "decryption", 
          "large costs", 
          "security", 
          "maps", 
          "filtering procedure", 
          "pixels", 
          "cost", 
          "significant properties", 
          "bits", 
          "related share", 
          "scheme", 
          "requirements", 
          "small capacity", 
          "information", 
          "performance", 
          "restrictive requirements", 
          "effectiveness", 
          "reversible recovery", 
          "advantages", 
          "help", 
          "concept", 
          "storage", 
          "share", 
          "simulations", 
          "selection", 
          "such thresholds", 
          "quality", 
          "unique properties", 
          "suspects", 
          "order", 
          "view", 
          "properties", 
          "psi", 
          "detail", 
          "threshold", 
          "phase", 
          "comparison", 
          "polynomials", 
          "capacity", 
          "area", 
          "cover", 
          "combination", 
          "procedure", 
          "conditions", 
          "pool", 
          "recovery", 
          "values", 
          "effect", 
          "same effect", 
          "participants", 
          "recovery phase", 
          "majority", 
          "PSIS", 
          "ESI", 
          "paper"
        ], 
        "name": "Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers", 
        "pagination": "1265-1287", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1104898116"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11042-018-6202-3"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11042-018-6202-3", 
          "https://app.dimensions.ai/details/publication/pub.1104898116"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_755.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11042-018-6202-3"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11042-018-6202-3'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11042-018-6202-3'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11042-018-6202-3'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11042-018-6202-3'


     

    This table displays all metadata directly associated to this object as RDF triples.

    200 TRIPLES      21 PREDICATES      118 URIs      99 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11042-018-6202-3 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N8c0a5d8429d546aea7a88acb83488ce2
    4 schema:citation sg:pub.10.1007/978-3-319-09644-5
    5 sg:pub.10.1007/978-3-642-14298-7_5
    6 sg:pub.10.1007/bfb0053419
    7 sg:pub.10.1007/s10623-016-0285-5
    8 sg:pub.10.1007/s11042-016-3429-8
    9 sg:pub.10.1007/s11042-016-3535-7
    10 sg:pub.10.1007/s11042-016-3844-x
    11 sg:pub.10.1007/s11042-017-5215-7
    12 sg:pub.10.1007/s11554-015-0540-4
    13 sg:pub.10.1007/s11554-016-0621-z
    14 sg:pub.10.1007/s11554-016-0644-5
    15 schema:datePublished 2018-06-19
    16 schema:datePublishedReg 2018-06-19
    17 schema:description In comparison with traditional secret image sharing (SIS), extended secret image sharing (ESIS) can encrypt the secret image into several meaningful shadow images rather than noise-like shares, which both decrease enemies’ suspects and make them more manageable for participants. However, a majority of current ESISs are based on a combination between SIS and steganography, which result in the limited performance such as the small capacity of secret information and the large cost for decryption. In this paper, we propose a (k, n) threshold extended polynomial-based ESIS, namely EPSIS, completely based on Shamir’s classic PSIS without the help of steganography. Firstly, novel concepts, such as the sharing map and sharing pool, are defined to reconstruct the sharing and recovery phases of PSIS; secondly, the secret image and halftone binary cover images act on the sharing phase to generate meaningful grayscale shares from the novel view of PSIS based on the sharing map; finally, in order to achieve the same effects but without the huge sharing map, a filtering procedure for appropriate shared values is added into the sharing phase of natural PSIS, which aims to make the most significant bit of pixel in each share equal to bit in corresponding binary cover. In comparison with current ESISs, the proposed EPSIS not only has advantages in the traditional properties, such (k, n) threshold, capacity, visual quality and computational cost, but also owns two unique properties about covers, including no restrictive requirements on the selection of covers and reversible recovery of cover with the single related share. These significant properties are beneficial for searchable encryption in the area of cloud storage. Furthermore, the security condition of the proposed EPSIS is discussed in detail, and then simulations are provided to verify the security and effectiveness.
    18 schema:genre article
    19 schema:isAccessibleForFree false
    20 schema:isPartOf Nea6640c465a24b0bb682e582b800d6e8
    21 Neab5b0744b894ceab8694663c1061372
    22 sg:journal.1044869
    23 schema:keywords EPSIS
    24 ESI
    25 PSIS
    26 advantages
    27 area
    28 bits
    29 capacity
    30 cloud storage
    31 combination
    32 comparison
    33 computational cost
    34 concept
    35 conditions
    36 cost
    37 cover
    38 cover image
    39 decryption
    40 detail
    41 effect
    42 effectiveness
    43 encryption
    44 filtering procedure
    45 help
    46 help of steganography
    47 image sharing
    48 image sharing scheme
    49 images
    50 information
    51 large costs
    52 limited performance
    53 majority
    54 maps
    55 meaningful shadow images
    56 noise-like shares
    57 novel concept
    58 novel view
    59 order
    60 paper
    61 participants
    62 performance
    63 phase
    64 pixels
    65 polynomials
    66 pool
    67 procedure
    68 properties
    69 psi
    70 quality
    71 recovery
    72 recovery phase
    73 related share
    74 requirements
    75 restrictive requirements
    76 reversible recovery
    77 same effect
    78 scheme
    79 searchable encryption
    80 secret image
    81 secret image sharing
    82 secret image sharing scheme
    83 secret information
    84 security
    85 security conditions
    86 selection
    87 shadow images
    88 share
    89 sharing
    90 sharing phase
    91 sharing scheme
    92 significant bits
    93 significant properties
    94 simulations
    95 small capacity
    96 steganography
    97 storage
    98 such thresholds
    99 suspects
    100 threshold
    101 traditional properties
    102 unique properties
    103 values
    104 view
    105 visual quality
    106 schema:name Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers
    107 schema:pagination 1265-1287
    108 schema:productId N477e7d83890e43ea8a9030f8f0f6c96f
    109 Nd4a7803105e64d1198daad5eb59e7cd1
    110 schema:sameAs https://app.dimensions.ai/details/publication/pub.1104898116
    111 https://doi.org/10.1007/s11042-018-6202-3
    112 schema:sdDatePublished 2022-12-01T06:37
    113 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    114 schema:sdPublisher N671dcf03feff4fd29ff88ce93af7d4d3
    115 schema:url https://doi.org/10.1007/s11042-018-6202-3
    116 sgo:license sg:explorer/license/
    117 sgo:sdDataset articles
    118 rdf:type schema:ScholarlyArticle
    119 N477e7d83890e43ea8a9030f8f0f6c96f schema:name dimensions_id
    120 schema:value pub.1104898116
    121 rdf:type schema:PropertyValue
    122 N671dcf03feff4fd29ff88ce93af7d4d3 schema:name Springer Nature - SN SciGraph project
    123 rdf:type schema:Organization
    124 N8c0a5d8429d546aea7a88acb83488ce2 rdf:first sg:person.013517427271.32
    125 rdf:rest Nb8d6950ad4e74d218dc473096838a8f8
    126 Nb8d6950ad4e74d218dc473096838a8f8 rdf:first sg:person.015112370271.93
    127 rdf:rest Nc256f35ea64e4cc198c991c501408f9b
    128 Nc256f35ea64e4cc198c991c501408f9b rdf:first sg:person.010467364517.31
    129 rdf:rest rdf:nil
    130 Nd4a7803105e64d1198daad5eb59e7cd1 schema:name doi
    131 schema:value 10.1007/s11042-018-6202-3
    132 rdf:type schema:PropertyValue
    133 Nea6640c465a24b0bb682e582b800d6e8 schema:volumeNumber 78
    134 rdf:type schema:PublicationVolume
    135 Neab5b0744b894ceab8694663c1061372 schema:issueNumber 2
    136 rdf:type schema:PublicationIssue
    137 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    138 schema:name Information and Computing Sciences
    139 rdf:type schema:DefinedTerm
    140 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    141 schema:name Artificial Intelligence and Image Processing
    142 rdf:type schema:DefinedTerm
    143 sg:grant.8304044 http://pending.schema.org/fundedItem sg:pub.10.1007/s11042-018-6202-3
    144 rdf:type schema:MonetaryGrant
    145 sg:journal.1044869 schema:issn 1380-7501
    146 1573-7721
    147 schema:name Multimedia Tools and Applications
    148 schema:publisher Springer Nature
    149 rdf:type schema:Periodical
    150 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.412110.7
    151 schema:familyName Yan
    152 schema:givenName Xuehu
    153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
    154 rdf:type schema:Person
    155 sg:person.013517427271.32 schema:affiliation grid-institutes:grid.412110.7
    156 schema:familyName Liu
    157 schema:givenName Lintao
    158 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013517427271.32
    159 rdf:type schema:Person
    160 sg:person.015112370271.93 schema:affiliation grid-institutes:grid.412110.7
    161 schema:familyName Lu
    162 schema:givenName Yuliang
    163 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93
    164 rdf:type schema:Person
    165 sg:pub.10.1007/978-3-319-09644-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024582239
    166 https://doi.org/10.1007/978-3-319-09644-5
    167 rdf:type schema:CreativeWork
    168 sg:pub.10.1007/978-3-642-14298-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050017989
    169 https://doi.org/10.1007/978-3-642-14298-7_5
    170 rdf:type schema:CreativeWork
    171 sg:pub.10.1007/bfb0053419 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008839066
    172 https://doi.org/10.1007/bfb0053419
    173 rdf:type schema:CreativeWork
    174 sg:pub.10.1007/s10623-016-0285-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030004022
    175 https://doi.org/10.1007/s10623-016-0285-5
    176 rdf:type schema:CreativeWork
    177 sg:pub.10.1007/s11042-016-3429-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027214688
    178 https://doi.org/10.1007/s11042-016-3429-8
    179 rdf:type schema:CreativeWork
    180 sg:pub.10.1007/s11042-016-3535-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026122719
    181 https://doi.org/10.1007/s11042-016-3535-7
    182 rdf:type schema:CreativeWork
    183 sg:pub.10.1007/s11042-016-3844-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1041425795
    184 https://doi.org/10.1007/s11042-016-3844-x
    185 rdf:type schema:CreativeWork
    186 sg:pub.10.1007/s11042-017-5215-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091893616
    187 https://doi.org/10.1007/s11042-017-5215-7
    188 rdf:type schema:CreativeWork
    189 sg:pub.10.1007/s11554-015-0540-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022432477
    190 https://doi.org/10.1007/s11554-015-0540-4
    191 rdf:type schema:CreativeWork
    192 sg:pub.10.1007/s11554-016-0621-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1009229081
    193 https://doi.org/10.1007/s11554-016-0621-z
    194 rdf:type schema:CreativeWork
    195 sg:pub.10.1007/s11554-016-0644-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016948860
    196 https://doi.org/10.1007/s11554-016-0644-5
    197 rdf:type schema:CreativeWork
    198 grid-institutes:grid.412110.7 schema:alternateName National University of Defense Technology, 230037, Hefei, China
    199 schema:name National University of Defense Technology, 230037, Hefei, China
    200 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...