Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-12-02

AUTHORS

Song Wan, Lanlan Qi, Guozheng Yang, Yuliang Lu, Xuehu Yan, Longlong Li

ABSTRACT

In this paper, a visual secret sharing (VSS) scheme with (n, n)(n ≥ 2) threshold for selective secret content using QR codes is investigated. Firstly, the secret message which can include different types of information(selective secret content) could be encoded into a secret QR code. Secondly, the secret QR code can be embedded into n cover QR codes. Finally, the proposed QR code visual secret sharing scheme(QRVSS) can visually reveal secret QR code with the abilities of stacking and XOR decryptions. Our QRVSS exploits the error correction mechanism inherent in the QR code structure, to embed the bits corresponding to shares that generated by VSS from a secret QR code bit into the same locations of the cover QR codes in the processing of encoding QRs. Each output share is a valid QR code that can be decoded and it may reduce the likelihood of attracting the attention of potential attackers. The reconstructed secret QR code can be decoded as same as the secret contents. In addition, QR codes can assist alignment for VSS recovery and the proposed scheme can be applied to many applications, such as express delivery. The experiment results show the effectiveness of our scheme. More... »

PAGES

2789-2811

References to SciGraph publications

  • 2014-11-29. 2D Barcodes for visual cryptography in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2010. A Comprehensive Study of Visual Cryptography in TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY V
  • 1995. Visual cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'94
  • 2011. Application Research of QRCode Barcode in Validation of Express Delivery in ADVANCED RESEARCH ON ELECTRONIC COMMERCE, WEB APPLICATION, AND COMMUNICATION
  • 2016-12-07. Efficient transform-based texture image retrieval techniques under quantization effects in MULTIMEDIA TOOLS AND APPLICATIONS
  • 2016-06-30. Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing in INFORMATION SECURITY AND PRIVACY
  • 2017-12-22. High Capacity Embedding Methods of QR Code Error Correction in WIRELESS INTERNET
  • 2012. Authenticating Visual Cryptography Shares Using 2D Barcodes in DIGITAL FORENSICS AND WATERMARKING
  • 2016-07-31. Clarity Corresponding to Contrast in Visual Cryptography in SOCIAL COMPUTING
  • 2011. Secret-Sharing Schemes: A Survey in CODING AND CRYPTOLOGY
  • 2013-12-24. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery in MULTIMEDIA TOOLS AND APPLICATIONS
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11042-019-08246-0

    DOI

    http://dx.doi.org/10.1007/s11042-019-08246-0

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1123089001


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Wan", 
            "givenName": "Song", 
            "id": "sg:person.012077574322.79", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012077574322.79"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Qi", 
            "givenName": "Lanlan", 
            "id": "sg:person.012653340127.33", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012653340127.33"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yang", 
            "givenName": "Guozheng", 
            "id": "sg:person.011516666750.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011516666750.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lu", 
            "givenName": "Yuliang", 
            "id": "sg:person.015112370271.93", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yan", 
            "givenName": "Xuehu", 
            "id": "sg:person.010467364517.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National University of Defense Technology, 230037, Hefei, China", 
              "id": "http://www.grid.ac/institutes/grid.412110.7", 
              "name": [
                "National University of Defense Technology, 230037, Hefei, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Li", 
            "givenName": "Longlong", 
            "id": "sg:person.014776417601.86", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014776417601.86"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-20367-1_56", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013251248", 
              "https://doi.org/10.1007/978-3-642-20367-1_56"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-32205-1_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016435694", 
              "https://doi.org/10.1007/978-3-642-32205-1_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-40253-6_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004151043", 
              "https://doi.org/10.1007/978-3-319-40253-6_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-981-10-2053-7_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027386787", 
              "https://doi.org/10.1007/978-981-10-2053-7_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-72998-5_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1099905939", 
              "https://doi.org/10.1007/978-3-319-72998-5_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-014-2365-8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043974419", 
              "https://doi.org/10.1007/s11042-014-2365-8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-013-1784-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021413130", 
              "https://doi.org/10.1007/s11042-013-1784-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20901-7_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035725690", 
              "https://doi.org/10.1007/978-3-642-20901-7_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11042-016-4205-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047610203", 
              "https://doi.org/10.1007/s11042-016-4205-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14298-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050017989", 
              "https://doi.org/10.1007/978-3-642-14298-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0053419", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008839066", 
              "https://doi.org/10.1007/bfb0053419"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-12-02", 
        "datePublishedReg": "2019-12-02", 
        "description": "In this paper, a visual secret sharing (VSS) scheme with (n, n)(n \u2265\u20092) threshold for selective secret content using QR codes is investigated. Firstly, the secret message which can include different types of information(selective secret content) could be encoded into a secret QR code. Secondly, the secret QR code can be embedded into n cover QR codes. Finally, the proposed QR code visual secret sharing scheme(QRVSS) can visually reveal secret QR code with the abilities of stacking and XOR decryptions. Our QRVSS exploits the error correction mechanism inherent in the QR code structure, to embed the bits corresponding to shares that generated by VSS from a secret QR code bit into the same locations of the cover QR codes in the processing of encoding QRs. Each output share is a valid QR code that can be decoded and it may reduce the likelihood of attracting the attention of potential attackers. The reconstructed secret QR code can be decoded as same as the secret contents. In addition, QR codes can assist alignment for VSS recovery and the proposed scheme can be applied to many applications, such as express delivery. The experiment results show the effectiveness of our scheme.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11042-019-08246-0", 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.8304044", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1044869", 
            "issn": [
              "1380-7501", 
              "1573-7721"
            ], 
            "name": "Multimedia Tools and Applications", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3-4", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "79"
          }
        ], 
        "keywords": [
          "secret QR code", 
          "visual secret sharing scheme", 
          "cover QR codes", 
          "secret sharing scheme", 
          "QR code", 
          "secret content", 
          "sharing scheme", 
          "QR code structure", 
          "visual secret sharing", 
          "valid QR code", 
          "VSS recovery", 
          "XOR decryptions", 
          "potential attackers", 
          "secret sharing", 
          "secret message", 
          "code structure", 
          "code bits", 
          "experiment results", 
          "express delivery", 
          "code", 
          "error correction mechanism", 
          "scheme", 
          "correction mechanism", 
          "bits", 
          "decryption", 
          "attacker", 
          "sharing", 
          "messages", 
          "output shares", 
          "processing", 
          "different types", 
          "QR", 
          "applications", 
          "effectiveness", 
          "alignment", 
          "share", 
          "same location", 
          "location", 
          "threshold", 
          "content", 
          "attention", 
          "results", 
          "ability", 
          "delivery", 
          "types", 
          "VSS", 
          "structure", 
          "addition", 
          "mechanism", 
          "likelihood", 
          "recovery", 
          "paper"
        ], 
        "name": "Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes", 
        "pagination": "2789-2811", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1123089001"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11042-019-08246-0"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11042-019-08246-0", 
          "https://app.dimensions.ai/details/publication/pub.1123089001"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:39", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_814.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11042-019-08246-0"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11042-019-08246-0'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11042-019-08246-0'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11042-019-08246-0'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11042-019-08246-0'


     

    This table displays all metadata directly associated to this object as RDF triples.

    198 TRIPLES      21 PREDICATES      89 URIs      68 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11042-019-08246-0 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 anzsrc-for:0803
    4 anzsrc-for:0806
    5 schema:author Nba7b6cc5c5b343e8b26db369ee18093f
    6 schema:citation sg:pub.10.1007/978-3-319-40253-6_25
    7 sg:pub.10.1007/978-3-319-72998-5_8
    8 sg:pub.10.1007/978-3-642-14298-7_5
    9 sg:pub.10.1007/978-3-642-20367-1_56
    10 sg:pub.10.1007/978-3-642-20901-7_2
    11 sg:pub.10.1007/978-3-642-32205-1_17
    12 sg:pub.10.1007/978-981-10-2053-7_23
    13 sg:pub.10.1007/bfb0053419
    14 sg:pub.10.1007/s11042-013-1784-2
    15 sg:pub.10.1007/s11042-014-2365-8
    16 sg:pub.10.1007/s11042-016-4205-5
    17 schema:datePublished 2019-12-02
    18 schema:datePublishedReg 2019-12-02
    19 schema:description In this paper, a visual secret sharing (VSS) scheme with (n, n)(n ≥ 2) threshold for selective secret content using QR codes is investigated. Firstly, the secret message which can include different types of information(selective secret content) could be encoded into a secret QR code. Secondly, the secret QR code can be embedded into n cover QR codes. Finally, the proposed QR code visual secret sharing scheme(QRVSS) can visually reveal secret QR code with the abilities of stacking and XOR decryptions. Our QRVSS exploits the error correction mechanism inherent in the QR code structure, to embed the bits corresponding to shares that generated by VSS from a secret QR code bit into the same locations of the cover QR codes in the processing of encoding QRs. Each output share is a valid QR code that can be decoded and it may reduce the likelihood of attracting the attention of potential attackers. The reconstructed secret QR code can be decoded as same as the secret contents. In addition, QR codes can assist alignment for VSS recovery and the proposed scheme can be applied to many applications, such as express delivery. The experiment results show the effectiveness of our scheme.
    20 schema:genre article
    21 schema:isAccessibleForFree false
    22 schema:isPartOf N5ceaa1d2dd8b4079b7cb1ca56e732770
    23 Nea06bf99b272408dae80accf03bc8103
    24 sg:journal.1044869
    25 schema:keywords QR
    26 QR code
    27 QR code structure
    28 VSS
    29 VSS recovery
    30 XOR decryptions
    31 ability
    32 addition
    33 alignment
    34 applications
    35 attacker
    36 attention
    37 bits
    38 code
    39 code bits
    40 code structure
    41 content
    42 correction mechanism
    43 cover QR codes
    44 decryption
    45 delivery
    46 different types
    47 effectiveness
    48 error correction mechanism
    49 experiment results
    50 express delivery
    51 likelihood
    52 location
    53 mechanism
    54 messages
    55 output shares
    56 paper
    57 potential attackers
    58 processing
    59 recovery
    60 results
    61 same location
    62 scheme
    63 secret QR code
    64 secret content
    65 secret message
    66 secret sharing
    67 secret sharing scheme
    68 share
    69 sharing
    70 sharing scheme
    71 structure
    72 threshold
    73 types
    74 valid QR code
    75 visual secret sharing
    76 visual secret sharing scheme
    77 schema:name Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes
    78 schema:pagination 2789-2811
    79 schema:productId N04b0a2e48ea24a5c8c93adb6853e8dae
    80 Ne88355579dc94542b6d84c64195927c7
    81 schema:sameAs https://app.dimensions.ai/details/publication/pub.1123089001
    82 https://doi.org/10.1007/s11042-019-08246-0
    83 schema:sdDatePublished 2022-12-01T06:39
    84 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    85 schema:sdPublisher N43dffbbefa5b45b1bbc4153661276256
    86 schema:url https://doi.org/10.1007/s11042-019-08246-0
    87 sgo:license sg:explorer/license/
    88 sgo:sdDataset articles
    89 rdf:type schema:ScholarlyArticle
    90 N04b0a2e48ea24a5c8c93adb6853e8dae schema:name doi
    91 schema:value 10.1007/s11042-019-08246-0
    92 rdf:type schema:PropertyValue
    93 N052ca96236e14414821cc3d914134b0d rdf:first sg:person.011516666750.26
    94 rdf:rest N9b0758924874416f94169b43b131c206
    95 N05362c7259bd48fc8b13575609dc3f84 rdf:first sg:person.010467364517.31
    96 rdf:rest Nd2dbccecabd341e7806ad90212fd6712
    97 N19470510ef9243d4a6b1997485039365 rdf:first sg:person.012653340127.33
    98 rdf:rest N052ca96236e14414821cc3d914134b0d
    99 N43dffbbefa5b45b1bbc4153661276256 schema:name Springer Nature - SN SciGraph project
    100 rdf:type schema:Organization
    101 N5ceaa1d2dd8b4079b7cb1ca56e732770 schema:volumeNumber 79
    102 rdf:type schema:PublicationVolume
    103 N9b0758924874416f94169b43b131c206 rdf:first sg:person.015112370271.93
    104 rdf:rest N05362c7259bd48fc8b13575609dc3f84
    105 Nba7b6cc5c5b343e8b26db369ee18093f rdf:first sg:person.012077574322.79
    106 rdf:rest N19470510ef9243d4a6b1997485039365
    107 Nd2dbccecabd341e7806ad90212fd6712 rdf:first sg:person.014776417601.86
    108 rdf:rest rdf:nil
    109 Ne88355579dc94542b6d84c64195927c7 schema:name dimensions_id
    110 schema:value pub.1123089001
    111 rdf:type schema:PropertyValue
    112 Nea06bf99b272408dae80accf03bc8103 schema:issueNumber 3-4
    113 rdf:type schema:PublicationIssue
    114 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    115 schema:name Information and Computing Sciences
    116 rdf:type schema:DefinedTerm
    117 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    118 schema:name Artificial Intelligence and Image Processing
    119 rdf:type schema:DefinedTerm
    120 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    121 schema:name Computer Software
    122 rdf:type schema:DefinedTerm
    123 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    124 schema:name Information Systems
    125 rdf:type schema:DefinedTerm
    126 sg:grant.8304044 http://pending.schema.org/fundedItem sg:pub.10.1007/s11042-019-08246-0
    127 rdf:type schema:MonetaryGrant
    128 sg:journal.1044869 schema:issn 1380-7501
    129 1573-7721
    130 schema:name Multimedia Tools and Applications
    131 schema:publisher Springer Nature
    132 rdf:type schema:Periodical
    133 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.412110.7
    134 schema:familyName Yan
    135 schema:givenName Xuehu
    136 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
    137 rdf:type schema:Person
    138 sg:person.011516666750.26 schema:affiliation grid-institutes:grid.412110.7
    139 schema:familyName Yang
    140 schema:givenName Guozheng
    141 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011516666750.26
    142 rdf:type schema:Person
    143 sg:person.012077574322.79 schema:affiliation grid-institutes:grid.412110.7
    144 schema:familyName Wan
    145 schema:givenName Song
    146 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012077574322.79
    147 rdf:type schema:Person
    148 sg:person.012653340127.33 schema:affiliation grid-institutes:grid.412110.7
    149 schema:familyName Qi
    150 schema:givenName Lanlan
    151 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012653340127.33
    152 rdf:type schema:Person
    153 sg:person.014776417601.86 schema:affiliation grid-institutes:grid.412110.7
    154 schema:familyName Li
    155 schema:givenName Longlong
    156 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014776417601.86
    157 rdf:type schema:Person
    158 sg:person.015112370271.93 schema:affiliation grid-institutes:grid.412110.7
    159 schema:familyName Lu
    160 schema:givenName Yuliang
    161 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015112370271.93
    162 rdf:type schema:Person
    163 sg:pub.10.1007/978-3-319-40253-6_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004151043
    164 https://doi.org/10.1007/978-3-319-40253-6_25
    165 rdf:type schema:CreativeWork
    166 sg:pub.10.1007/978-3-319-72998-5_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1099905939
    167 https://doi.org/10.1007/978-3-319-72998-5_8
    168 rdf:type schema:CreativeWork
    169 sg:pub.10.1007/978-3-642-14298-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050017989
    170 https://doi.org/10.1007/978-3-642-14298-7_5
    171 rdf:type schema:CreativeWork
    172 sg:pub.10.1007/978-3-642-20367-1_56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013251248
    173 https://doi.org/10.1007/978-3-642-20367-1_56
    174 rdf:type schema:CreativeWork
    175 sg:pub.10.1007/978-3-642-20901-7_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035725690
    176 https://doi.org/10.1007/978-3-642-20901-7_2
    177 rdf:type schema:CreativeWork
    178 sg:pub.10.1007/978-3-642-32205-1_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016435694
    179 https://doi.org/10.1007/978-3-642-32205-1_17
    180 rdf:type schema:CreativeWork
    181 sg:pub.10.1007/978-981-10-2053-7_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027386787
    182 https://doi.org/10.1007/978-981-10-2053-7_23
    183 rdf:type schema:CreativeWork
    184 sg:pub.10.1007/bfb0053419 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008839066
    185 https://doi.org/10.1007/bfb0053419
    186 rdf:type schema:CreativeWork
    187 sg:pub.10.1007/s11042-013-1784-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021413130
    188 https://doi.org/10.1007/s11042-013-1784-2
    189 rdf:type schema:CreativeWork
    190 sg:pub.10.1007/s11042-014-2365-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043974419
    191 https://doi.org/10.1007/s11042-014-2365-8
    192 rdf:type schema:CreativeWork
    193 sg:pub.10.1007/s11042-016-4205-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047610203
    194 https://doi.org/10.1007/s11042-016-4205-5
    195 rdf:type schema:CreativeWork
    196 grid-institutes:grid.412110.7 schema:alternateName National University of Defense Technology, 230037, Hefei, China
    197 schema:name National University of Defense Technology, 230037, Hefei, China
    198 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...