Retraction
Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique
Paper Information
Record ID:
47133
Publication Date:
December 10, 2018
Retraction Date:
June 13, 2023
(2.4 years years ago)
Subjects:
Institutions:
- School of Computing, Kalasalingam Academy of Research and Education, Krishnankoil, India
- Faculty of Computers and Information, Mansoura University, Mansoura, Egypt
- Department of Computer Science and Engineering, Sahrdaya College of Engineering and Technology, Kodakara, Kerela, India
- Department of Electronics and Instrumentation Engineering, B. S. Abdur Rahman Crescent Institute of Science and Technology, Chennai, India
- Department of Computer Science and Engineering, University of North Texas, Denton, USA
Countries:
Article Type:
Publisher:
Springer
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed
Retraction Details
Citations (75)
75
Total Citations8
Post-Retraction(10.7%)
67
Pre-Retraction0
Same DayPost-Retraction Citation Analysis
1
Within 30 days
5
Within 1 year
0
After 2+ years
685
Days since retraction (latest)
Visually enhanced multi-secret sharing scheme with arithmetic modulo, DWT, and particle swarm optimization for Meaningful Shares
Arjun Singh Rawat, Maroti Deshmukh, Maheep Singh
Cluster Computing
Published: Apr 2025
685 days after retraction
Lightweight secure image encryption: a tent map chaos theory approach
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh et al. (5 authors)
Multimedia Tools and Applications
Published: Apr 2025
671 days after retraction
Biometric Holographic Encryption and Authentication with Multiple Optics-Biology Keys Based on Inhomogeneous Media Optics
Rui Xu, Ming Feng, Jiaxin Yang et al. (10 authors)
Chinese Journal of Physics
Published: Aug 2024
1 citation
1 citation
433 days after retraction
STKVS: secure technique for keyframes-based video summarization model
Parul Saini, Krishan Berwal, Shamal Kashid et al. (4 authors)
Multimedia Tools and Applications
Published: May 2024
3 citations
3 citations
329 days after retraction
Optical essential secret image sharing using unequal modulus decomposition and gyrator transform
Mohamed G. Abdelfattah, Salem F. Hegazy, S. S. A. Obayya
Optical and Quantum Electronics
Open Access
Published: Dec 2023
5 citations
5 citations
183 days after retraction
ESTPE: An efficient and stable thumbnail-preserving encryption scheme
Dong Xie, Yibo Zhang, Zebang Hu et al. (5 authors)
Journal of King Saud University - Computer and Information Sciences
Open Access
Published: Oct 2023
4 citations
4 citations
138 days after retraction
Optimal DNA Encoding with Secret Sharing Scheme for Medical Image Encryption
A. H. A. Hussein, Mazin Riyadh Al-Hameed, Hussein A. Al-luhiby et al. (6 authors)
2022 5th International Conference on Engineering Technology and its Applications (IICETA)
Published: Jul 2023
32 days after retraction
S-method: secure multimedia encryption technique in cloud environment
Parul Saini, Krishan Kumar
Multimedia Tools and Applications
Published: Jun 2023
3 citations
3 citations
3 days after retraction
MDO: a novel murmuration-flight based dispersive optimization algorithm and its application to image security
Vandana Bharti, Bhaskar Biswas, K.K. Shukla
Journal of Ambient Intelligence and Humanized Computing
Published: Feb 2023
4 citations
4 citations
126 days before retraction
Using robotics, artificial intelligence, and deep learning to collect COVID-19 samples
Tawanda Mushiri, Marvellous Moyo
Elsevier eBooks
Published: Jan 2023
1 citation
1 citation
163 days before retraction
BEMSS- Blockwise Encryption based Multi Secret Sharing scheme for Securing Visual Content
Parul Saini, Krishan Kumar, Shamal Kashid et al. (5 authors)
2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)
Published: Dec 2022
5 citations
5 citations
193 days before retraction
Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment
Mesfer Al Duhayyim, Mohammed Maray, Ayman Qahmash et al. (8 authors)
Computers, materials & continua/Computers, materials & continua (Print)
Open Access
Published: Oct 2022
1 citation
1 citation
225 days before retraction
IoT-Based English Translation Teaching from the Perspective of Artificial Intelligence
Dandan Liu
International Journal of Antennas and Propagation
Open Access
Published: Oct 2022
6 citations
6 citations
245 days before retraction
Analysis of Various Visual Cryptographic Techniques and Their Issues Based on Optimization Algorithms
A S Sajitha, S. Sridevi Sathya Priya
International Journal of Image and Graphics
Published: Sep 2022
3 citations
3 citations
283 days before retraction
A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification
Aswini Vinay Soreng, Shyamalendu Kandar
Journal of Ambient Intelligence and Humanized Computing
Published: Jul 2022
8 citations
8 citations
319 days before retraction
Primary Color Based Numerous Image Creation in Visual Cryptography with the Help of Grasshopper Algorithm, Artificial Neural Network and Elliptic Curve Cryptography
Surajit Goon, Debdutta Pal, Souvik Dihidar
Journal of Computer Science
Open Access
Published: May 2022
2 citations
2 citations
408 days before retraction
A Comprehensive Review About Image Encryption Methods
Cihan TİKEN, Rüya Şamlı
Harran Üniversitesi Mühendislik Dergisi
Open Access
Published: Apr 2022
10 citations
10 citations
427 days before retraction
An Effective Secured Privacy-Protecting Data Aggregation Method in IoT
Sabyasachi Pramanik
Advances in wireless technologies and telecommunication book series
Published: Mar 2022
43 citations
43 citations
466 days before retraction
Novel Image Encryption and Compression Scheme for IoT Environment
K. M. Delphin Raj, Sun-Ho Yum, Jinyoung Lee et al. (6 authors)
Computers, materials & continua/Computers, materials & continua (Print)
Open Access
Published: Nov 2021
2 citations
2 citations
587 days before retraction
Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design
Yiying Liu, Young Chun Ko
Advances in Mathematical Physics
Open Access
Published: Oct 2021
5 citations
5 citations
590 days before retraction
Secure and Optimal Secret Sharing Scheme for Color Images
K. Shankar, David Taniar, Eunmok Yang et al. (4 authors)
Mathematics
Open Access
Published: Sep 2021
7 citations
7 citations
628 days before retraction
An overview of visual cryptography techniques
Dyala R. Ibrahim, Je Sen Teh, Rosni Abdullah
Multimedia Tools and Applications
Published: Jul 2021
49 citations
49 citations
692 days before retraction
Prognostication of Covid-19 and Heart Disease: A Combined Approach
Satheesh Kumar R, Saranya Ramakrishnan, Riny Roy et al. (5 authors)
2021 International Conference on Communication, Control and Information Sciences (ICCISc)
Published: Jun 2021
3 citations
3 citations
727 days before retraction
Feature Recognition of Abstract Art Painting Multilevel Based Convolutional Ancient Recognition Neural Network Method
Chaofeng Li, Ebin Deni Raj
Journal of Interconnection Networks
Published: Jun 2021
5 citations
5 citations
732 days before retraction
Asymmetric DNA encryption and decryption technique for Arabic plaintext
Meshrif Alruily, Osama R. Shahin, Hassan Al-Mahdi et al. (4 authors)
Journal of Ambient Intelligence and Humanized Computing
Published: Apr 2021
21 citations
21 citations
794 days before retraction
A Comparative Study on Disease Detection of Plants using Machine Learning Techniques
Vishnu S Babu, R. Satheesh Kumar, R. Sunder
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS)
Published: Mar 2021
9 citations
9 citations
816 days before retraction
WEB BASED DATABASE SECURITY IN INTERNET OF THINGS USING FULLY HOMOMORPHIC ENCRYPTION AND DISCRETE BEE COLONY OPTIMIZATION
Samuel Raj Samuel Raj, M. Viju Prakash, T. Prince et al. (6 authors)
Malaysian Journal of Computer Science
Open Access
Published: Nov 2020
6 citations
6 citations
928 days before retraction
Secure image classification with deep neural networks for IoT applications
Abdelrhman Hassan, Fei Liu, Fanchuan Wang et al. (4 authors)
Journal of Ambient Intelligence and Humanized Computing
Published: Oct 2020
10 citations
10 citations
970 days before retraction
A SECURE CIPHER FOR THE GRAY IMAGES BASED ON THE SHAMIR SECRET SHARING SCHEME WITH DISCRETE WAVELET HAAR TRANSFORM
Riyadh Jameel Toama
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
Open Access
Published: Jun 2020
4 citations
4 citations
1084 days before retraction
Attainment of Better Security in IoT Based Live Monitoring Using Hybrid Atom Search optimization Employed ECC
Seema Nath, Subhranil Som, Mukesh Chandra Negi
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
Published: Jun 2020
3 citations
3 citations
1107 days before retraction
Efficient & secure image availability and content protection
Hassan Noura, Mohamad Noura, Ola Salman et al. (5 authors)
Multimedia Tools and Applications
Open Access
Published: Jun 2020
4 citations
4 citations
1107 days before retraction
Point-by-point feature extraction of artificial intelligence images based on the Internet of Things
Chengcheng Mo, Wei Sun
Computer Communications
Published: May 2020
9 citations
9 citations
1128 days before retraction
Multimodal Biometric Authentication System using Deep Learning Method
Sandeep Singh Sengar, U. Hariharan, K. Rajkumar
2021 International Conference on Emerging Smart Computing and Informatics (ESCI)
Published: Mar 2020
41 citations
41 citations
1199 days before retraction
A Review of the Application of Deep Learning in the Classification of Diabetic Retinopathy
Xuyan Yu, Jianxia Liu, Wenxuan Xue
Studies in distributed intelligence
Published: Jan 2020
1259 days before retraction
An Efficient Framework for Secure Image Archival and Retrieval System Using Multiple Secret Share Creation Scheme
A. Francis Saviour Devaraj, G. Murugaboopathi, Mohamed Elhoseny et al. (7 authors)
IEEE Access
Open Access
Published: Jan 2020
27 citations
27 citations
1259 days before retraction
Remote Sensing Image Fusion Using Improved IHS and Non-subsampled Contourlet Transform
Yong Zeng, Wei Yi, Jianan Deng et al. (6 authors)
Studies in distributed intelligence
Published: Jan 2020
2 citations
2 citations
1259 days before retraction
UAS Traffic Management in Low-Altitude Airspace Based on Three Dimensional Digital Aerial Corridor System
Feng Dengchao, Pengfei Du, Huiya Shen et al. (4 authors)
Studies in distributed intelligence
Published: Jan 2020
2 citations
2 citations
1259 days before retraction
Analyzing of Spatial Interactive Network Based on Urban Community Division
Ning Li, Yaqin Ye, Jiao Pan et al. (5 authors)
Studies in distributed intelligence
Published: Jan 2020
1259 days before retraction
Research on Low Altitude Object Detection Based on Deep Convolution Neural Network
Yongjun Qi, Junhua Gu, Zepei Tian et al. (5 authors)
Studies in distributed intelligence
Published: Jan 2020
1259 days before retraction
Medical Image Security - the State-of-the-Art
C. Devi Parameswari, K. Shankar
International Journal of Recent Technology and Engineering (IJRTE)
Open Access
Published: Dec 2019
3 citations
3 citations
1260 days before retraction
An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps
Anvita Gupta, Dilbag Singh, Manjit Kaur
Journal of Ambient Intelligence and Humanized Computing
Published: Sep 2019
92 citations
92 citations
1366 days before retraction
Mobility and QoS Analysis in VANET Using NMP with Salp Optimization Models
K. Shankar, M. Ilayaraja, K. Sathesh Kumar et al. (4 authors)
Studies in systems, decision and control
Published: Jul 2019
5 citations
5 citations
1427 days before retraction
Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model
Mohamed Elhoseny, K. Shankar
Studies in systems, decision and control
Published: Jul 2019
77 citations
77 citations
1427 days before retraction
RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers
S. Sheeba Rani, Jafar A. Alzubi, S. K. Lakshmanaprabu et al. (5 authors)
Multimedia Tools and Applications
Published: May 2019
56 citations
56 citations
1476 days before retraction
Research on maximum power point tracking method of photovoltaic power generation
Yi Zhang, Hexu Sun, Yingjun Guo
Journal of Intelligent & Fuzzy Systems
Published: May 2019
7 citations
7 citations
1488 days before retraction
Driving model of innovation of business model based on cloud computing
Tianli Liu
Journal of Intelligent & Fuzzy Systems
Published: May 2019
2 citations
2 citations
1488 days before retraction
Application and research of automatic password update technology based on the development of wireless network
Ming Zhang
Journal of Intelligent & Fuzzy Systems
Published: May 2019
2 citations
2 citations
1488 days before retraction
Research on breakthrough and innovation of UAV mission planning method based on cloud computing-based reinforcement learning algorithm
Rong Liu, Jin Liang, Majid Alkhambashi
Journal of Intelligent & Fuzzy Systems
Published: May 2019
5 citations
5 citations
1488 days before retraction
The construction mechanism and algorithm of cross border E-commerce export logistics mode from the perspective of value chain
Qingwen Yuan
Journal of Intelligent & Fuzzy Systems
Published: May 2019
18 citations
18 citations
1488 days before retraction
Research on theoretical analysis of human capital of labor economics based on artificial intelligence
Haibo Wang, Hua Li
Journal of Intelligent & Fuzzy Systems
Published: May 2019
11 citations
11 citations
1488 days before retraction
Quick Stats
Total Citations:
75
Years Since Retraction:
2.4 years
Open Access:
Yes
Last Checked:
Jul 24, 2025