{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:06:47Z","timestamp":1725808007393},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319126425"},{"type":"electronic","value":"9783319126432"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12643-2_77","type":"book-chapter","created":{"date-parts":[[2014,10,21]],"date-time":"2014-10-21T22:58:17Z","timestamp":1413932297000},"page":"636-643","source":"Crossref","is-referenced-by-count":3,"title":["Essential Visual Cryptographic Scheme with Different Importance of Shares"],"prefix":"10.1007","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Ching-Nung","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"77_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"issue":"5","key":"77_CR2","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C.C. Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: Secret image sharing. Computers & Graphics\u00a026(5), 765\u2013770 (2002)","journal-title":"Computers & Graphics"},{"issue":"12","key":"77_CR3","doi-asserted-by":"publisher","first-page":"3652","DOI":"10.1016\/j.patcog.2007.04.001","volume":"40","author":"S.J. Lin","year":"2007","unstructured":"Lin, S.J., Lin, J.C.: Vcpss: A two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognition\u00a040(12), 3652\u20133666 (2007)","journal-title":"Pattern Recognition"},{"issue":"12","key":"77_CR4","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","volume":"28","author":"C.N. Yang","year":"2010","unstructured":"Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing\u00a028(12), 1600\u20131610 (2010)","journal-title":"Image and Vision Computing"},{"issue":"7","key":"77_CR5","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1016\/j.jvcir.2013.07.005","volume":"24","author":"P. Li","year":"2013","unstructured":"Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation\u00a024(7), 1106\u20131114 (2013)","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"3","key":"77_CR6","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z. Wang","year":"2009","unstructured":"Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security\u00a04(3), 383\u2013396 (2009)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"77_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Processing (2014), doi:10.1016\/j.sigpro.2014.06.011","DOI":"10.1016\/j.sigpro.2014.06.011"},{"key":"77_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-14298-7_5","volume-title":"Transactions on Data Hiding and Multimedia Security V","author":"J. Weir","year":"2010","unstructured":"Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol.\u00a06010, pp. 70\u2013105. Springer, Heidelberg (2010)"},{"issue":"10","key":"77_CR10","first-page":"2172","volume":"82","author":"H. Kuwakado","year":"1999","unstructured":"Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a082(10), 2172\u20132177 (1999)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"4","key":"77_CR11","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett.\u00a025(4), 481\u2013494 (2004)","journal-title":"Pattern Recognit. Lett."},{"issue":"1","key":"77_CR12","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S. Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. The Computer Journal\u00a049(1), 97\u2013107 (2006)","journal-title":"The Computer Journal"},{"issue":"6","key":"77_CR13","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O. Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters\u00a012(6), 377\u2013379 (1987)","journal-title":"Optics Letters"},{"issue":"5","key":"77_CR14","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X. Wu","year":"2013","unstructured":"Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Processing\u00a093(5), 977\u2013995 (2013)","journal-title":"Signal Processing"},{"issue":"8","key":"77_CR15","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T. Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software\u00a086(8), 2094\u20132109 (2013)","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"77_CR16","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"S.J. Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recognition\u00a040(3), 1014\u20131031 (2007)","journal-title":"Pattern Recognition"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12643-2_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T02:46:58Z","timestamp":1559011618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12643-2_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319126425","9783319126432"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12643-2_77","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}