{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:22:47Z","timestamp":1764588167793,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030656096"},{"type":"electronic","value":"9783030656102"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65610-2_13","type":"book-chapter","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T09:03:39Z","timestamp":1607159019000},"page":"198-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings"],"prefix":"10.1007","author":[{"given":"Sabyasachi","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Md Kutubuddin","family":"Sardar","sequence":"additional","affiliation":[]},{"given":"Avishek","family":"Adhikari","sequence":"additional","affiliation":[]},{"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,6]]},"reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s10623-013-9832-5","volume":"73","author":"A Adhikari","year":"2013","unstructured":"Adhikari, A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Crypt. 73(3), 865\u2013895 (2013). https:\/\/doi.org\/10.1007\/s10623-013-9832-5","journal-title":"Des. Codes Crypt."},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-30556-9_31","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"A Adhikari","year":"2004","unstructured":"Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399\u2013413. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30556-9_31"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-24582-7_11","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"A Adhikari","year":"2003","unstructured":"Adhikari, A., Sikdar, S.: A new (2,n)-visual threshold scheme for color images. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 148\u2013161. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24582-7_11"},{"key":"13_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1599-8_9","volume-title":"Basic Modern Algebra with Applications","author":"MR Adhikari","year":"2014","unstructured":"Adhikari, M.R., Adhikari, A.: Basic Modern Algebra with Applications. Springer, New Delhi (2014). https:\/\/doi.org\/10.1007\/978-81-322-1599-8_9"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10623-012-9722-2","volume":"71","author":"S Arumugam","year":"2014","unstructured":"Arumugam, S., Lakshmanan, R., Nagar, A.K.: On $$(k, n)^*$$-visual cryptography scheme. Des. Codes Crypt. 71(1), 153\u2013162 (2014). https:\/\/doi.org\/10.1007\/s10623-012-9722-2","journal-title":"Des. Codes Crypt."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual Cryptography for General Access Structures. Inf. Comput. 129, 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-61440-0_147","volume-title":"Automata, Languages and Programming","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416\u2013428. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61440-0_147"},{"issue":"9","key":"13_CR8","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1145\/360336.360343","volume":"19","author":"JR Bitner","year":"1976","unstructured":"Bitner, J.R., Ehrlich, G., Reingold, E.M.: Efficient generation of the binary reflected Gray code. Commun. ACM 19(9), 517\u2013521 (1976)","journal-title":"Commun. ACM"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Blundo, C., D\u2019arco, P., Santis, A.D., Stinson, D.R.: Contrast optimal threshold visual cryptography. SIAM J. Discrete Math. 16(2), 224\u2013261 (2003)","DOI":"10.1137\/S0895480198336683"},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C Blundo","year":"2001","unstructured":"Blundo, C., Bonis, A.D., Santis, A.D.: Improved schemes for visual cryptography. Des. Codes Crypt. 24(3), 255\u2013278 (2001)","journal-title":"Des. Codes Crypt."},{"issue":"9","key":"13_CR11","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1109\/TIFS.2018.2819125","volume":"13","author":"Y Cheng","year":"2018","unstructured":"Cheng, Y., Fu, Z., Yu, B.: Improved visual secret sharing scheme for QR code applications. IEEE Trans. Inf. Forensics Secur. 13(9), 2393\u20132403 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"Cimato, S., Prisco, R.D., Santis, A.D.: Optimal colored threshold visual cryptography schemes. Des. Codes Crypt. 35(3), 311\u2013335 (2005). https:\/\/doi.org\/10.1007\/s10623-003-6741-z","journal-title":"Des. Codes Crypt."},{"issue":"1\u20133","key":"13_CR13","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S Cimato","year":"2007","unstructured":"Cimato, S., Prisco, R.D., Santis, A.D.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1\u20133), 261\u2013276 (2007)","journal-title":"Theor. Comput. Sci."},{"key":"13_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/b11068","volume-title":"Visual Cryptography and Secret Image Sharing","author":"S Cimato","year":"2011","unstructured":"Cimato, S., Yang, C.N.: Visual Cryptography and Secret Image Sharing. Taylor & Francis, CRC Press (2011)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-55046-1_6","volume-title":"Transactions on Data Hiding and Multimedia Security IX","author":"S Cimato","year":"2014","unstructured":"Cimato, S., Yang, J.C.N., Wu, C.-C.: Visual cryptography based watermarking. In: Shi, Y.Q., Liu, F., Yan, W. (eds.) Transactions on Data Hiding and Multimedia Security IX. LNCS, vol. 8363, pp. 91\u2013109. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55046-1_6"},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10623-015-0075-5","volume":"80","author":"S Dutta","year":"2016","unstructured":"Dutta, S., Rohit, R.S., Adhikari, A.: Constructions and analysis of some efficient $$t-(k, n)^*$$-visual cryptographic schemes using linear algebraic techniques. Des. Codes Crypt. 80(1), 165\u2013196 (2016)","journal-title":"Des. Codes Crypt."},{"key":"13_CR17","first-page":"230","volume":"2014","author":"S Dutta","year":"2014","unstructured":"Dutta, S., Adhikari, A.: XOR based non-monotone $$t-(k, n)^*$$ -visual cryptographic schemes using linear algebra. ICICS 2014, 230\u2013242 (2014)","journal-title":"ICICS"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-319-72089-0_4","volume-title":"Information Theoretic Security","author":"S Dutta","year":"2017","unstructured":"Dutta, S., Adhikari, A.: Contrast optimal XOR based visual cryptographic schemes. In: Shikata, J. (ed.) ICITS 2017. LNCS, vol. 10681, pp. 58\u201372. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72089-0_4"},{"issue":"7","key":"13_CR19","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1007\/s10623-018-0570-6","volume":"87","author":"S Dutta","year":"2018","unstructured":"Dutta, S., Adhikari, A., Ruj, S.: Maximal contrast color visual secret sharing schemes. Des. Codes Crypt. 87(7), 1699\u20131711 (2018). https:\/\/doi.org\/10.1007\/s10623-018-0570-6","journal-title":"Des. Codes Crypt."},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-319-04268-8_4","volume-title":"Information Theoretic Security","author":"T Guo","year":"2014","unstructured":"Guo, T., Liu, F., Wu, C.K., Ren, Y.W., Wang, W.: On $$(k, n)$$ visual cryptography scheme with $$t$$ essential parties. In: Padr\u00f3, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 56\u201368. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04268-8_4"},{"issue":"7","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y-C Hou","year":"2003","unstructured":"Hou, Y.-C.: Visual cryptography for color images. Pattern Recogn. 36(7), 1619\u20131629 (2003)","journal-title":"Pattern Recogn."},{"issue":"2","key":"13_CR22","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TIFS.2011.2170975","volume":"7","author":"M Iwamoto","year":"2012","unstructured":"Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372\u2013382 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"13_CR23","doi-asserted-by":"publisher","first-page":"033019","DOI":"10.1117\/1.1993625","volume":"14","author":"D Jin","year":"2005","unstructured":"Jin, D., Yan, W.-Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3), 033019 (2005)","journal-title":"J. Electron. Imaging"},{"issue":"6","key":"13_CR24","first-page":"1262","volume":"81","author":"H Koga","year":"1998","unstructured":"Koga, H., Yamamoto, H.: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fund. Electron. Commun. Comput. Sci. 81(6), 1262\u20131269 (1998)","journal-title":"IEICE Trans. Fund. Electron. Commun. Comput. Sci."},{"issue":"4","key":"13_CR25","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F Liu","year":"2008","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151\u2013165 (2008)","journal-title":"IET Inf. Secur."},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053419"},{"key":"13_CR27","unstructured":"Rijmen, V., Preneel, B.: Efficient colour visual encryption or Shared colors of benetton. EUROCRYPT 1996 Rump Section (1996). http:\/\/www.iacr.org\/conference\/ec96\/rump\/preneel.ps.gz"},{"key":"13_CR28","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-54525-2_21","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"K Praveen","year":"2014","unstructured":"Praveen, K., Rajeev, K., Sethumadhavan, M.: On the extensions of (k, n)*-visual cryptographic schemes. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 231\u2013238. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54525-2_21"},{"issue":"12","key":"13_CR29","doi-asserted-by":"publisher","first-page":"14511","DOI":"10.1007\/s11042-016-3867-3","volume":"76","author":"G Shen","year":"2017","unstructured":"Shen, G., Liu, F., Fu, Z., Yu, B.: New insight into linear algebraic technique to construct visual cryptography scheme for general access structure. Multimedia Tools Appl. 76(12), 14511\u201314533 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"13_CR30","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10623-016-0285-5","volume":"85","author":"G Shen","year":"2016","unstructured":"Shen, G., Liu, F., Fu, Z., Yu, B.: Perfect contrast XOR-based visual cryptography schemes via linear algebra. Des. Codes Crypt. 85(1), 15\u201337 (2016). https:\/\/doi.org\/10.1007\/s10623-016-0285-5","journal-title":"Des. Codes Crypt."},{"issue":"10","key":"13_CR31","doi-asserted-by":"publisher","first-page":"12871","DOI":"10.1007\/s11042-017-4921-5","volume":"77","author":"G Shen","year":"2017","unstructured":"Shen, G., Liu, F., Fu, Z., Yu, B.: Visual cryptograms of random grids via linear algebra. Multimedia Tools Appl. 77(10), 12871\u201312899 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4921-5","journal-title":"Multimedia Tools Appl."},{"issue":"5","key":"13_CR32","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"SJ Shyu","year":"2006","unstructured":"Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39(5), 866\u2013880 (2006)","journal-title":"Pattern Recogn."},{"issue":"2","key":"13_CR33","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"ER Verheul","year":"1997","unstructured":"Verheul, E.R., Tilborg, H.C.A.: Constructions and properties of $$k$$ out of $$n$$ visual secret sharing schemes. Des. Codes Crypt. 11(2), 179\u2013196 (1997). https:\/\/doi.org\/10.1023\/A:1008280705142","journal-title":"Des. Codes Crypt."},{"key":"13_CR34","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C-N Yang","year":"2004","unstructured":"Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"3","key":"13_CR35","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C-N Yang","year":"2000","unstructured":"Yang, C.-N., Laih, C.-S.: New colored visual secret sharing schemes. Des. Codes Crypt. 20(3), 325\u2013336 (2000)","journal-title":"Des. Codes Crypt."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65610-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:47:36Z","timestamp":1710269256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65610-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030656096","9783030656102"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65610-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isrdc.iitb.ac.in\/iciss2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 3 work-in-progress papers were published.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}