{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:58:12Z","timestamp":1743076692977,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319042671"},{"type":"electronic","value":"9783319042688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04268-8_3","type":"book-chapter","created":{"date-parts":[[2014,1,22]],"date-time":"2014-01-22T13:17:57Z","timestamp":1390396677000},"page":"39-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]},{"given":"Roberto","family":"De Prisco","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,23]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-24582-7_11","volume-title":"INDOCRYPT 2003. LNCS","author":"A Adhikari","year":"2003","unstructured":"Adhikari, A., Sikdar, S.: A new (2, n)-visual threshold scheme for color images. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 148\u2013161. Springer, Heidelberg (2003)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"key":"3_CR3","first-page":"416","volume-title":"ICALP 1996. LNCS","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416\u2013428. Springer, Heidelberg (1996)"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theor. Comput. Sci. 250, 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369, 169\u2013182 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16, 224\u2013261 (2003)","journal-title":"SIAM J. Discrete Math."},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C Blundo","year":"2001","unstructured":"Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Des. Codes. Crypt. 24, 255\u2013278 (2001)","journal-title":"Des. Codes. Crypt."},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/S0097-8493(98)00034-X","volume":"22","author":"C Blundo","year":"1998","unstructured":"Blundo, C., De Santis, A.: Visual cryptography schemes with perfect reconstruction of black pixels. J. Comput. Graph. 22, 449\u2013455 (1998)","journal-title":"J. Comput. Graph."},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12, 261\u2013289 (1999)","journal-title":"J. Cryptol."},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1016\/j.jvcir.2012.03.004","volume":"23","author":"S-K Chen","year":"2012","unstructured":"Chen, S.-K., Lin, S.-J.: Optimal $$(2, n)$$ and $$(2,\\infty )$$ visual secret sharing by generalized random grids. J. Vis. Commun. Image Represent. 23, 677\u2013684 (2012)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"T-H Chen","year":"2009","unstructured":"Chen, T.-H., Tsao, K.-H.: Visual secret sharing revisited. Pattern Recogn. 42, 2203\u20132217 (2009)","journal-title":"Pattern Recogn."},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T-H Chen","year":"2011","unstructured":"Chen, T.-H., Tsao, K.-H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"key":"3_CR13","first-page":"235","volume-title":"SCN 2004. LNCS","author":"S Cimato","year":"2005","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 235\u2013248. Springer, Heidelberg (2005)"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Optimal colored threshold visual cryptography schemes. Des. Codes. Crypt. 35, 311\u2013335 (2005)","journal-title":"Des. Codes. Crypt."},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97\u2013107 (2006)","journal-title":"Comput. J."},{"issue":"1\u20133","key":"3_CR16","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S Cimato","year":"2007","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1\u20133), 261\u2013276 (2007)","journal-title":"Theor. Comput. Sci."},{"volume-title":"Visual Cryptography and Secret Image Sharing","year":"2012","key":"3_CR17","unstructured":"Cimato, S., Yang, C.-N. (eds.): Visual Cryptography and Secret Image Sharing. CRC Press, USA (2012). ISBN 978-1-4398-3721-4"},{"key":"3_CR18","first-page":"182","volume-title":"ICITS 2011. LNCS","author":"R De Prisco","year":"2011","unstructured":"De Prisco, R., De Santis, A.: Using colors to improve visual cryptography for black and white images. In: Fehr, S. (ed.) ICITS 2011. LNCS, vol. 6673, pp. 182\u2013201. Springer, Heidelberg (2011)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"De Prisco, R., De Santis, A., Color visual cryptography schemes for black and white secret images. Theor. Comput. Sci. http:\/\/dx.doi.org\/10.1016\/j.tcs.2013.09.005, to appear","DOI":"10.1016\/j.tcs.2013.09.005"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y-C Hou","year":"2003","unstructured":"Hou, Y.-C.: Visual cryptography for color images. Pattern Recogn. 36, 1619\u20131629 (2003)","journal-title":"Pattern Recogn."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"PA Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes. Crypt. 25, 15\u201361 (2002)","journal-title":"Des. Codes. Crypt."},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal $$k$$ out of $$n$$ secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240, 471\u2013485 (2000)","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"3_CR23","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377\u2013379 (1987)","journal-title":"Opt. Lett."},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1017\/S096354830200559X","volume":"12","author":"M Krause","year":"2003","unstructured":"Krause, M., Simon, H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb. Probab. Comput. 12, 285\u2013299 (2003)","journal-title":"Comb. Probab. Comput."},{"key":"3_CR25","first-page":"1262","volume":"81\u2013A(6)","author":"H Koga","year":"1988","unstructured":"Koga, H.: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 81\u2013A(6), 1262\u20131269 (1988)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"3_CR26","unstructured":"Kuhlmann, C., Simon, H.U.: Construction of visual secret sharing schemes with almost optimal contrast. In: Proceedings of the 11th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, pp. 262\u2013272, 9\u201311 January 2000"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10878-009-9241-x","volume":"21","author":"S Lu","year":"2011","unstructured":"Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Comb. Optim. 21, 47\u201366 (2011)","journal-title":"J. Comb. Optim."},{"key":"3_CR28","first-page":"1","volume-title":"EUROCRYPT 1994. LNCS","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"S-J Shyu","year":"2007","unstructured":"Shyu, S.-J.: Image encryption by random grids. Pattern Recogn. 40, 1014\u20131031 (2007)","journal-title":"Pattern Recogn."},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"S-J Shyu","year":"2009","unstructured":"Shyu, S.-J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582\u20131596 (2009)","journal-title":"Pattern Recogn."},{"key":"3_CR31","first-page":"221","volume-title":"FCT 2005. LNCS","author":"HU Simon","year":"2005","unstructured":"Simon, H.U.: Perfect reconstruction of black pixels revisited. In: Li\u015bkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 221\u2013232. Springer, Heidelberg (2005)"},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"ER Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of $$k$$ out of $$n$$ visual secret. sharing schemes. Des. Codes. Crypt. 11, 179\u2013196 (1997)","journal-title":"Des. Codes. Crypt."},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1016\/j.optcom.2010.06.042","volume":"283","author":"R-Z Wang","year":"2010","unstructured":"Wang, R.-Z., Lan, Y.-C., Lee, Y.-K., Huang Shyu, S.J., Chia, T.L.: Incrementing visual cryptography using random grids. Opt. Commun. 283, 4242\u20134249 (2010)","journal-title":"Opt. Commun."},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C-N Yang","year":"2004","unstructured":"Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"9","key":"3_CR35","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1093\/ietfec\/e88-a.9.2471","volume":"88\u2013A","author":"C-N Yang","year":"2005","unstructured":"Yang, C.-N., Chen, T.-S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88\u2013A(9), 2471\u20132474 (2005)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"3_CR36","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"C-N Yang","year":"2005","unstructured":"Yang, C.-N., Chen, T.-S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn. Lett. 26, 193\u2013206 (2005)","journal-title":"Pattern Recogn. Lett."},{"key":"3_CR37","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"CN Yang","year":"2000","unstructured":"Yang, C.N., Laih, C.-S.: New colored visual secret sharing schemes. Des. codes. crypt. 20, 325\u2013335 (2000)","journal-title":"Des. codes. crypt."}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04268-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T03:21:59Z","timestamp":1674530519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-04268-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319042671","9783319042688"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04268-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"23 January 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}