{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:17:40Z","timestamp":1760955460963,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319027258"},{"type":"electronic","value":"9783319027265"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-02726-5_29","type":"book-chapter","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T09:39:17Z","timestamp":1383125957000},"page":"404-412","source":"Crossref","is-referenced-by-count":4,"title":["Threshold Secret Image Sharing"],"prefix":"10.1007","author":[{"given":"Teng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"ChingNung","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"YaWei","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Visual cryptography for general access structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Chan, C., Sung, P.: Secret image sharing with steganography and authentication using dynamic programming strategy. In: PCSPA, pp. 382\u2013395 (2010)","DOI":"10.1109\/PCSPA.2010.98"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"C. Chang","year":"2008","unstructured":"Chang, C., Hsieh, Y., Lin, C.: Sharing secrets in stego images with authentication. Pattern Recognition\u00a041, 3130\u20133137 (2008)","journal-title":"Pattern Recognition"},{"key":"29_CR4","volume-title":"Elements of information theory","author":"T. Cover","year":"2006","unstructured":"Cover, T., Thomas, J.: Elements of information theory, 2nd edn. Wiley Interscience, New York (2006)","edition":"2"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-13772-3_33","volume-title":"Image Analysis and Recognition","author":"E. Elsheh","year":"2010","unstructured":"Elsheh, E., Hamza, A.B.: Robust approaches to 3D object secret sharing. In: Campilho, A., Kamel, M. (eds.) ICIAR 2010. LNCS, vol.\u00a06111, pp. 326\u2013335. Springer, Heidelberg (2010)"},{"key":"29_CR6","unstructured":"Goldreich, O.: Randomized methods in computation (2001), \n                    \n                      http:\/\/www.wisdom.weizmann.ac.il\/~oded\/rnd.html"},{"key":"29_CR7","unstructured":"Goldwasser, S., Bellare, M.: Lecture notes on cryptography (2008), \n                    \n                      http:\/\/cseweb.ucsd.edu\/~mihir\/papers\/gb.pdf"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-34704-7_7","volume-title":"Information Security and Cryptology","author":"T. Guo","year":"2012","unstructured":"Guo, T., Liu, F., Wu, C.: Multi-pixel encryption visual cryptography. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol.\u00a07537, pp. 86\u201392. Springer, Heidelberg (2012)"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-29101-2_15","volume-title":"Information Security Practice and Experience","author":"T. Guo","year":"2012","unstructured":"Guo, T., Liu, F., Wu, C.: On the equivalence of two definitions of visual cryptography scheme. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol.\u00a07232, pp. 217\u2013227. Springer, Heidelberg (2012)"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T. Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. The Journal of Systems and Software\u00a086, 2094\u20132109 (2013)","journal-title":"The Journal of Systems and Software"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.sigpro.2013.06.003","volume":"94","author":"T. Guo","year":"2014","unstructured":"Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Processing\u00a094, 90\u2013101 (2014)","journal-title":"Signal Processing"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.jss.2009.10.012","volume":"83","author":"C. Huang","year":"2010","unstructured":"Huang, C., Hsieh, C., Huang, P.: Progressive sharing for a secret image. The Journal of Systems and Software\u00a083, 517\u2013527 (2010)","journal-title":"The Journal of Systems and Software"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to modern cryptography. CRC Press (2007)","DOI":"10.1201\/9781420010756"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.jvcir.2012.01.003","volume":"23","author":"P. Li","year":"2012","unstructured":"Li, P., Ma, P., Su, X., Yang, C.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation\u00a023, 441\u2013453 (2012)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F. Liu","year":"2012","unstructured":"Liu, F., Guo, T., Wu, C., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. Journal of Visual Communication and Image Representation\u00a023, 331\u2013342 (2012)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"11","key":"29_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C. Thien","year":"2002","unstructured":"Thien, C., Lin, J.: Secret image sharing. Computers and Graphics\u00a026, 765\u2013770 (2002)","journal-title":"Computers and Graphics"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"C. Thien","year":"2003","unstructured":"Thien, C., Lin, J.: An image-sharing method with user-friendly shadow images. IEEE Transactions on Circuits and Systems for Video Technology\u00a013, 1161\u20131169 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.jss.2010.11.928","volume":"84","author":"M. Ulutas","year":"2011","unstructured":"Ulutas, M., Ulutas, G., Nabiyev, V.: Medical image security and epr hiding using shamir\u2019s secret sharing scheme. The Journal of Systems and Software\u00a084, 341\u2013353 (2011)","journal-title":"The Journal of Systems and Software"},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1016\/j.jvcir.2010.06.001","volume":"21","author":"R. Wang","year":"2010","unstructured":"Wang, R., Chien, Y., Lin, Y.: Scalable user-friendly image sharing. Journal of Visual Communication and Image Representation\u00a021, 751\u2013761 (2010)","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"29_CR22","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.image.2006.12.012","volume":"22","author":"R. Wang","year":"2007","unstructured":"Wang, R., Shyu, S.: Scalable secret image sharing. Signal Processing: Image Communication\u00a022, 363\u2013373 (2007)","journal-title":"Signal Processing: Image Communication"},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"C. Yang","year":"2007","unstructured":"Yang, C., Chen, T., Yu, K., Wang, C.: Improvements of image sharing with steganography and authentication. The Journal of Systems and Software\u00a080, 1070\u20131076 (2007)","journal-title":"The Journal of Systems and Software"},{"key":"29_CR24","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1016\/j.patcog.2009.01.024","volume":"42","author":"C. Yang","year":"2009","unstructured":"Yang, C., Ciou, C.: A comment on \u201csharing secrets in stegoimages with authentication\u201d. Pattern Recognition\u00a042, 1615\u20131619 (2009)","journal-title":"Pattern Recognition"},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","volume":"28","author":"C. Yang","year":"2010","unstructured":"Yang, C., Ciou, C.: Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing\u00a028, 1600\u20131610 (2010)","journal-title":"Image and Vision Computing"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Yang, C., Huang, Y., Syue, J.: Reversible secret image sharing based on shamir\u2019s scheme with discrete haar wavelet transform. In: ICECE, vol.\u00a016-18, pp. 1250\u20131253 (2011)","DOI":"10.1109\/ICECENG.2011.6057938"},{"key":"29_CR27","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1016\/j.optcom.2011.12.003","volume":"285","author":"C. Yang","year":"2012","unstructured":"Yang, C., Ouyang, J., Harn, L.: Steganography and authentication in image sharing without parity bits. Optics Communications\u00a0285, 1725\u20131735 (2012)","journal-title":"Optics Communications"},{"key":"29_CR28","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.csi.2007.10.012","volume":"31","author":"R. Zhao","year":"2009","unstructured":"Zhao, R., Zhao, J., Dai, F., Zhao, F.: A new image secret sharing scheme to identify cheaters. Computer Standards and Interfaces\u00a031, 252\u2013257 (2009)","journal-title":"Computer Standards and Interfaces"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02726-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:25:51Z","timestamp":1566764751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02726-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319027258","9783319027265"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02726-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}