{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:17:55Z","timestamp":1760955475233,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319042671"},{"type":"electronic","value":"9783319042688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04268-8_4","type":"book-chapter","created":{"date-parts":[[2014,1,22]],"date-time":"2014-01-22T13:17:57Z","timestamp":1390396677000},"page":"56-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["On $$(k, n)$$ Visual Cryptography Scheme with $$t$$ Essential Parties"],"prefix":"10.1007","author":[{"given":"Teng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"YaWei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,23]]},"reference":[{"key":"4_CR1","first-page":"1","volume-title":"EUROCRYPT 1994. LNCS","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"4_CR2","first-page":"401","volume-title":"CRYPTO 1996. LNCS","author":"S Droste","year":"1996","unstructured":"Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401\u2013415. Springer, Heidelberg (1996)"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"E Verheul","year":"1997","unstructured":"Verheul, E., Tilborg, H.V.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Crypt. 11(2), 179\u2013196 (1997)","journal-title":"Des. Codes Crypt."},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"PA Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25, 15\u201361 (2002)","journal-title":"Des. Codes Crypt."},{"issue":"2","key":"4_CR5","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240(2), 471\u2013485 (2000)","journal-title":"Theoret. Comput. Sci."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1019939020426","volume":"27","author":"WG Tzeng","year":"2002","unstructured":"Tzeng, W.G., Hu, C.M.: A new approach for visual cryptography. Des. Codes Crypt. 27, 207\u2013227 (2002)","journal-title":"Des. Codes Crypt."},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369, 169\u2013182 (2006)","journal-title":"Theoret. Comput. Sci."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10623-008-9225-3","volume":"50","author":"F Liu","year":"2009","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Des. Codes Crypt. 50, 215\u2013227 (2009)","journal-title":"Des. Codes Crypt."},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/TIFS.2011.2117419","volume":"6","author":"DS Wang","year":"2011","unstructured":"Wang, D.S., Dong, L., Li, X.B.: Towards shift tolerant visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 323\u2013337 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"GB Horng","year":"2006","unstructured":"Horng, G.B., Chen, T.H., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Crypt. 38, 219\u2013236 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2007","unstructured":"Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36\u201345 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"4_CR13","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1109\/TIP.2012.2190082","volume":"21","author":"YC Chen","year":"2012","unstructured":"Chen, Y.C., Horng, G., Tsai, D.S.: Comment on \u201ccheating prevention in visual cryptography\u201d. IEEE Trans. Image Process. 21(7), 3319\u20133323 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"4_CR14","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/LSP.2009.2021334","volume":"16","author":"RZ Wang","year":"2009","unstructured":"Wang, R.Z.: Region incrementing visual cryptography. IEEE Signal Process. Lett. 16(8), 659\u2013662 (2009)","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"4_CR15","first-page":"779","volume":"22","author":"CN Yang","year":"2012","unstructured":"Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.: k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(6), 779\u2013810 (2012)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"4_CR16","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/TCSVT.2011.2180769","volume":"22","author":"SJ Shyu","year":"2012","unstructured":"Shyu, S.J.: Efficient construction for region incrementing visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5), 769\u2013777 (2012)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86, 2094\u20132109 (2013)","journal-title":"J. Syst. Softw."},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.sigpro.2013.06.003","volume":"94","author":"T Guo","year":"2014","unstructured":"Guo, T., Liu, F., Wu, C.K.: k out of k extended visual cryptography scheme by random grids. Sig. Process 94, 90\u2013101 (2014)","journal-title":"Sig. Process"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Crypt. (2012). doi:10.1007\/s10623-012-9722-2","DOI":"10.1007\/s10623-012-9722-2"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Crypt. 12(4), 261\u2013289 (1999)","journal-title":"J. Crypt."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-30556-9_31","volume-title":"INDOCRYPT 2004. LNCS","author":"A Adhikari","year":"2004","unstructured":"Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399\u2013413. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04268-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:01:51Z","timestamp":1676844111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-04268-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319042671","9783319042688"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04268-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"23 January 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}