Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
11315 | 991 | 19.8 | 46% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
11315 | 1 | VISUAL CRYPTOGRAPHY//SECRET SHARING//VISUAL SECRET SHARING | 991 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | VISUAL CRYPTOGRAPHY | authKW | 4844241 | 18% | 86% | 183 |
2 | SECRET SHARING | authKW | 4115818 | 25% | 54% | 246 |
3 | VISUAL SECRET SHARING | authKW | 3102248 | 11% | 92% | 109 |
4 | SECRET SHARING SCHEME | authKW | 2085568 | 10% | 70% | 97 |
5 | PIXEL EXPANSION | authKW | 1448124 | 5% | 100% | 47 |
6 | SECRET IMAGE SHARING | authKW | 1387155 | 5% | 98% | 46 |
7 | RANDOM GRID | authKW | 1260392 | 5% | 87% | 47 |
8 | THRESHOLD SCHEME | authKW | 883883 | 5% | 61% | 47 |
9 | IMAGE SHARING | authKW | 591072 | 3% | 71% | 27 |
10 | MULTI SECRET SHARING | authKW | 554601 | 2% | 100% | 18 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 18087 | 37% | 0% | 369 |
2 | Computer Science, Information Systems | 16121 | 33% | 0% | 329 |
3 | Computer Science, Software Engineering | 3744 | 15% | 0% | 144 |
4 | Computer Science, Hardware & Architecture | 2398 | 9% | 0% | 89 |
5 | Engineering, Electrical & Electronic | 2225 | 29% | 0% | 288 |
6 | Mathematics, Applied | 1368 | 16% | 0% | 156 |
7 | Computer Science, Artificial Intelligence | 827 | 8% | 0% | 80 |
8 | Telecommunications | 654 | 7% | 0% | 73 |
9 | Imaging Science & Photographic Technology | 493 | 3% | 0% | 33 |
10 | Optics | 101 | 6% | 0% | 56 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | GRP MATH NUMER ANAL DYNAM SYST | 133296 | 2% | 29% | 15 |
2 | DIPARTIMENTO INFORMAT PLICAZ | 78255 | 3% | 10% | 26 |
3 | COMP SCI INFORMAT ENGN | 70012 | 16% | 1% | 157 |
4 | BASIC REQUIRED COURSES | 61622 | 0% | 100% | 2 |
5 | COMP SCI TELECOM ENGN | 61622 | 0% | 100% | 2 |
6 | CRYPTOG COMP NETWORK SECUR | 45303 | 1% | 29% | 5 |
7 | ADV COMPUTING ALGORITHMS CRYPTOGR H | 30811 | 0% | 100% | 1 |
8 | BRANCH BADR | 30811 | 0% | 100% | 1 |
9 | BRANCH PL MATH PL SCI | 30811 | 0% | 100% | 1 |
10 | CHINA MED UNIV TAICHUNG | 30811 | 0% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | DESIGNS CODES AND CRYPTOGRAPHY | 25748 | 4% | 2% | 38 |
2 | JOURNAL OF CRYPTOLOGY | 22705 | 2% | 4% | 18 |
3 | IET INFORMATION SECURITY | 13756 | 1% | 4% | 12 |
4 | SECURITY AND COMMUNICATION NETWORKS | 12776 | 2% | 2% | 24 |
5 | JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION | 9359 | 2% | 1% | 22 |
6 | IMAGING SCIENCE JOURNAL | 9249 | 1% | 2% | 14 |
7 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 8871 | 5% | 1% | 48 |
8 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 7845 | 2% | 1% | 19 |
9 | LECTURE NOTES IN COMPUTER SCIENCE | 7068 | 15% | 0% | 144 |
10 | MULTIMEDIA TOOLS AND APPLICATIONS | 5629 | 3% | 1% | 25 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | VISUAL CRYPTOGRAPHY | 4844241 | 18% | 86% | 183 | Search VISUAL+CRYPTOGRAPHY | Search VISUAL+CRYPTOGRAPHY |
2 | SECRET SHARING | 4115818 | 25% | 54% | 246 | Search SECRET+SHARING | Search SECRET+SHARING |
3 | VISUAL SECRET SHARING | 3102248 | 11% | 92% | 109 | Search VISUAL+SECRET+SHARING | Search VISUAL+SECRET+SHARING |
4 | SECRET SHARING SCHEME | 2085568 | 10% | 70% | 97 | Search SECRET+SHARING+SCHEME | Search SECRET+SHARING+SCHEME |
5 | PIXEL EXPANSION | 1448124 | 5% | 100% | 47 | Search PIXEL+EXPANSION | Search PIXEL+EXPANSION |
6 | SECRET IMAGE SHARING | 1387155 | 5% | 98% | 46 | Search SECRET+IMAGE+SHARING | Search SECRET+IMAGE+SHARING |
7 | RANDOM GRID | 1260392 | 5% | 87% | 47 | Search RANDOM+GRID | Search RANDOM+GRID |
8 | THRESHOLD SCHEME | 883883 | 5% | 61% | 47 | Search THRESHOLD+SCHEME | Search THRESHOLD+SCHEME |
9 | IMAGE SHARING | 591072 | 3% | 71% | 27 | Search IMAGE+SHARING | Search IMAGE+SHARING |
10 | MULTI SECRET SHARING | 554601 | 2% | 100% | 18 | Search MULTI+SECRET+SHARING | Search MULTI+SECRET+SHARING |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | DE SANTIS, A , DE PRISCO, R , (2014) ON THE RELATION OF RANDOM GRID AND DETERMINISTIC VISUAL CRYPTOGRAPHY.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 9. ISSUE 4. P. 653 -665 | 40 | 100% | 5 |
2 | YANG, CN , YANG, YY , (2014) NEW EXTENDED VISUAL CRYPTOGRAPHY SCHEMES WITH CLEARER SHADOW IMAGES.INFORMATION SCIENCES. VOL. 271. ISSUE . P. 246-263 | 40 | 100% | 2 |
3 | YANG, CN , CHEN, CH , CAI, SR , (2016) ENHANCED BOOLEAN-BASED MULTI SECRET IMAGE SHARING SCHEME.JOURNAL OF SYSTEMS AND SOFTWARE. VOL. 116. ISSUE . P. 22 -34 | 30 | 97% | 3 |
4 | LIAN, CF , PANG, LJ , LIANG, JM , (2015) GENERALIZED RANDOM GRID-BASED VISUAL SECRET SHARING FOR GENERAL ACCESS STRUCTURES.COMPUTER JOURNAL. VOL. 58. ISSUE 10. P. 2426 -2442 | 36 | 97% | 0 |
5 | YANG, CN , WU, CC , WANG, DS , (2014) A DISCUSSION ON THE RELATIONSHIP BETWEEN PROBABILISTIC VISUAL CRYPTOGRAPHY AND RANDOM GRID.INFORMATION SCIENCES. VOL. 278. ISSUE . P. 141 -173 | 35 | 100% | 2 |
6 | D'ARCO, P , DE PRISCO, R , DE SANTIS, A , (2014) MEASURE-INDEPENDENT CHARACTERIZATION OF CONTRAST OPTIMAL VISUAL CRYPTOGRAPHY SCHEMES.JOURNAL OF SYSTEMS AND SOFTWARE. VOL. 95. ISSUE . P. 89 -99 | 34 | 100% | 3 |
7 | WU, XT , SUN, W , (2014) EXTENDED CAPABILITIES FOR XOR-BASED VISUAL CRYPTOGRAPHY.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 9. ISSUE 10. P. 1592 -1605 | 32 | 100% | 2 |
8 | YANG, CN , WANG, DS , (2014) PROPERTY ANALYSIS OF XOR-BASED VISUAL CRYPTOGRAPHY.IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY. VOL. 24. ISSUE 2. P. 189-197 | 30 | 100% | 7 |
9 | GUO, T , LIU, F , WU, CK , (2014) K OUT OF K EXTENDED VISUAL CRYPTOGRAPHY SCHEME BY RANDOM GRIDS.SIGNAL PROCESSING. VOL. 94. ISSUE . P. 90 -101 | 28 | 100% | 9 |
10 | CU, DH , SUN, W , WU, XT , (2015) NON-EXPANSIBLE XOR-BASED VISUAL CRYPTOGRAPHY SCHEME WITH MEANINGFUL SHARES.SIGNAL PROCESSING. VOL. 108. ISSUE . P. 604 -621 | 30 | 97% | 0 |
Classes with closest relation at Level 1 |