{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:29:50Z","timestamp":1743067790108,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590055"},{"type":"electronic","value":"9783030590062"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59006-2_4","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T10:01:47Z","timestamp":1599732107000},"page":"36-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Does Randomness in the Random Visual Cryptography Protocol Depend on the Period of Pseudorandom Number Generators?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9725-2479","authenticated-orcid":false,"given":"Leszek J.","family":"Chmielewski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6755-1830","authenticated-orcid":false,"given":"Arkadiusz","family":"Or\u0142owski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"4_CR1","unstructured":"Brewer, C.A.: \n                  www.colorbrewer.org\n                  \n                 (2018). Accessed 9 May 2020"},{"key":"4_CR2","unstructured":"Chmielewski, L.J., Gawdzik, G., Or\u0142owski, A.: Towards color visual cryptography with completely random shares. In: Proceedings of the Conference PP-RAI 2019 - Konf. Polskiego Porozumienia na rzecz Rozwoju Sztucznej Inteligencji, pp. 150\u2013155. Wroc\u0142aw University of Science and Technology, Wroc\u0142aw, Poland, 16\u201318 October 2019. \n                  http:\/\/pp-rai.pwr.edu.pl\/PPRAI19_proceedings.pdf"},{"key":"4_CR3","unstructured":"Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing, 1st edn. CRC Press Inc., Boca Raton (2017). \n                  https:\/\/www.crcpress.com\/Visual-Cryptography-and-Secret-Image-Sharing\/Cimato-Yang\/p\/book\/9781138076044"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1016\/j.compeleceng.2017.09.017","volume":"70","author":"K Dhiman","year":"2018","unstructured":"Dhiman, K., Kasana, S.S.: Extended visual cryptography techniques for true color images. Comput. Electr. Eng. 70, 647\u2013658 (2018). \n                  https:\/\/doi.org\/10.1016\/j.compeleceng.2017.09.017","journal-title":"Comput. Electr. Eng."},{"issue":"6","key":"4_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377\u2013379 (1987). \n                  https:\/\/doi.org\/10.1364\/OL.12.000377","journal-title":"Opt. Lett."},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0167-8655(02)00259-3","volume":"24","author":"CC Lin","year":"2003","unstructured":"Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recogn. Lett. 24(1), 349\u2013358 (2003). \n                  https:\/\/doi.org\/10.1016\/S0167-8655(02)00259-3","journal-title":"Pattern Recogn. Lett."},{"issue":"4","key":"4_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F Liu","year":"2008","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151\u2013165 (2008). \n                  https:\/\/doi.org\/10.1049\/iet-ifs:20080066","journal-title":"IET Inf. Secur."},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). \n                  https:\/\/doi.org\/10.1007\/BFb0053419"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Naor, M., Shamir, A.: Visual cryptography II: improving the contrast via the cover base. In: Lomas, M. (ed.) Security Protocols. LNCS, vol. 1189, pp. 197\u2013202. Springer, Heidelberg (1997). \n                  https:\/\/doi.org\/10.1007\/3-540-62494-5_18","DOI":"10.1007\/3-540-62494-5_18"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Or\u0142owski, A., Chmielewski, L.J.: Color visual cryptography with completely randomly coded colors. In: Vento, M., Percannella, G. (eds.) CAIP 2019. LNCS, vol. 11678, pp. 589\u2013599. Springer, Heidelberg (2019). \n                  https:\/\/doi.org\/10.1007\/978-3-030-29888-3_48","DOI":"10.1007\/978-3-030-29888-3_48"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Or\u0142owski, A., Chmielewski, L.J.: Generalized visual cryptography scheme with completely random shares. In: Petkov, N., Strisciuglio, N., Travieso, C.M. (eds.) Proc. 2nd International Conference Applications of Intelligent Systems APPIS 2019, pp. 33:1\u201333:6. Association for Computing Machinery, Las Palmas de Gran Canaria (2019). \n                  https:\/\/doi.org\/10.1145\/3309772.3309805","DOI":"10.1145\/3309772.3309805"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Or\u0142owski, A., Chmielewski, L.J.: Randomness of shares versus quality of secret reconstruction in black-and-white visual cryptography. In: Rutkowski, L., et al. (eds.) ICAISC 2019. LNAI, vol. 11509, pp. 58\u201369. Springer, Cham (2019). \n                  https:\/\/doi.org\/10.1007\/978-3-030-20915-5_6","DOI":"10.1007\/978-3-030-20915-5_6"},{"key":"4_CR13","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report 800\u201322 Rev 1a, National Institute of Standards and Technology, 16 September 2010. \n                  http:\/\/www.nist.gov\/manuscript-publication-search.cfm?pub_id=906762\n                  \n                , series: Special Publication (NIST SP)"},{"issue":"5\u20136","key":"4_CR14","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1080\/19393555.2019.1567872","volume":"27","author":"RG Sharma","year":"2018","unstructured":"Sharma, R.G., Dimri, P., Garg, H.: Visual cryptographic techniques for secret image sharing: a review. Inf. Secur. J.: A Glob. Perspect. 27(5\u20136), 241\u2013259 (2018). \n                  https:\/\/doi.org\/10.1080\/19393555.2019.1567872","journal-title":"Inf. Secur. J.: A Glob. Perspect."},{"key":"4_CR15","unstructured":"The MathWorks Inc: MATLAB. Natick, MA, USA (2020). \n                  https:\/\/www.mathworks.com"},{"key":"4_CR16","unstructured":"The MathWorks Inc: MATLAB documentation: Creating and Controlling a Random Number Stream. Natick, MA, USA (2020). \n                  https:\/\/www.mathworks.com\/help\/matlab\/math\/creating-and-controlling-a-random-number-stream.html\n                  \n                . Accessed 04 Jan 2020"},{"key":"4_CR17","volume-title":"The Visual Display of Quantitative Information","author":"ER Tufte","year":"1983","unstructured":"Tufte, E.R.: The Visual Display of Quantitative Information. Graphic Press, Cheshire (1983)"},{"issue":"21","key":"4_CR18","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1016\/j.optcom.2010.06.042","volume":"283","author":"RZ Wang","year":"2010","unstructured":"Wang, R.Z., Lan, Y.C., Lee, Y.K., et al.: Incrementing visual cryptography using random grids. Opt. Commun. 283(21), 4242\u20134249 (2010). \n                  https:\/\/doi.org\/10.1016\/j.optcom.2010.06.042","journal-title":"Opt. Commun."},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Wu, H., Wang, H., Yu, R.: Color visual cryptography scheme using meaningful shares. In: Proceedings of the 8th International Conference Intelligent Systems Design and Applications ISDA 2008, vol. 3, pp. 173\u2013178. Kaohsiung, Taiwan, November 2008. \n                  https:\/\/doi.org\/10.1109\/ISDA.2008.130","DOI":"10.1109\/ISDA.2008.130"}],"container-title":["Lecture Notes in Computer Science","Computer Vision and Graphics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59006-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T19:54:26Z","timestamp":1599767666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-59006-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590055","9783030590062"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59006-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCVG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Vision and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccvg2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccvg.wzim.sggw.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"proprietary conference system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,35","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,25","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic ICCVG 2020 was held as a virtual event.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}