{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:19:12Z","timestamp":1760955552630,"version":"3.41.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193205"},{"type":"electronic","value":"9783319193212"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19321-2_25","type":"book-chapter","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T17:20:34Z","timestamp":1432747234000},"page":"333-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Optimal XOR Based (2,n)-Visual Cryptography Schemes"],"prefix":"10.1007","author":[{"given":"Feng","family":"Liu","sequence":"first","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,28]]},"reference":[{"issue":"6","key":"25_CR1","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1109\/18.59932","volume":"36","author":"NJA Sloane","year":"1990","unstructured":"Sloane, N.J.A., Brouwer, A.E., Shearer, J.B., Warren, D.S.: A new table of constant weight codes. IEEE Trans. Inf. Theory 36(6), 1334\u20131380 (1990)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"unstructured":"Biham, E., Itzkovitz, A.: Visual cryptography with polarization. In: The Dagstuhl Seminar on Cryptography, September 1997, and in the RUMP session of CRYPTO 1998 (1997)","key":"25_CR3"},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261\u2013289 (1999)","journal-title":"J. Cryptol."},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/S0167-8655(02)00023-5","volume":"23","author":"CC Chang","year":"2002","unstructured":"Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recogn. Lett. 23, 931\u2013941 (2002)","journal-title":"Pattern Recogn. Lett."},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1016\/j.patcog.2006.02.009","volume":"39","author":"TH Chen","year":"2006","unstructured":"Chen, T.H., Tsai, D.S.: Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recogn. 39, 1530\u20131541 (2006)","journal-title":"Pattern Recogn."},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ipl.2004.10.011","volume":"93","author":"S Cimato","year":"2005","unstructured":"Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93, 199\u2013206 (2005)","journal-title":"Inf. Process. Lett."},{"unstructured":"Dinitz, J.H., Stinson, D.R.: Chap. 1 in Contemporary Design Theory: A Collection of Surveys. Wiley, New York (1992)","key":"25_CR8"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"S Droste","year":"1996","unstructured":"Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401\u2013415. Springer, Heidelberg (1996)"},{"issue":"7","key":"25_CR10","doi-asserted-by":"publisher","first-page":"3004","DOI":"10.1109\/18.959279","volume":"47","author":"A Vardy","year":"2001","unstructured":"Vardy, A., Agrell, E., Zeger, K.: A table of upper bounds for binary codes. IEEE Trans. Inf. Theory 47(7), 3004\u20133006 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR11","volume-title":"Shift Register Sequences","author":"S Golomb","year":"1967","unstructured":"Golomb, S.: Shift Register Sequences. Holden-Day, San Francisco (1967)"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-29101-2_15","volume-title":"Information Security Practice and Experience","author":"T Guo","year":"2012","unstructured":"Guo, T., Liu, F., Wu, C.K.: On the equivalence of two definitions of visual cryptography scheme. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 217\u2013227. Springer, Heidelberg (2012)"},{"issue":"8","key":"25_CR13","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094\u20132109 (2013)","journal-title":"J. Syst. Softw."},{"unstructured":"Hawkes, L.W., Yasinsac, A., Cline, C.: An application of visual cryptography to financial documents. In: Master thesis of Security and Assurance in Information Technology Laboratory, Computer Science Department, Florida State University (1997)","key":"25_CR14"},{"issue":"7","key":"25_CR15","first-page":"077003:1","volume":"44","author":"CS Hsu","year":"2005","unstructured":"Hsu, C.S., Hou, Y.C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt. Eng. 44(7), 077003:1\u2013077003:10 (2005)","journal-title":"Opt. Eng."},{"issue":"A.No.10","key":"25_CR16","first-page":"2172","volume":"E82","author":"R Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E82(A.No.10), 2172\u20132177 (1999)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/11602897_10","volume-title":"Information and Communications Security","author":"H Kuwakado","year":"2005","unstructured":"Kuwakado, H., Morii, M., Tanaka, H.: Visual cryptographic protocols using the trusted initializer. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 112\u2013122. Springer, Heidelberg (2005)"},{"key":"25_CR18","first-page":"1193","volume":"87","author":"H Kuwakado","year":"2004","unstructured":"Kuwakado, H., Tanaka, H.: Size-reduced visual secret sharing scheme. IEICE Trans. Fundam. 87, 1193\u20131197 (2004)","journal-title":"IEICE Trans. Fundam."},{"issue":"5","key":"25_CR19","doi-asserted-by":"publisher","first-page":"373","DOI":"10.4218\/etrij.02.0102.0505","volume":"24","author":"SS Lee","year":"2002","unstructured":"Lee, S.S., Na, J.C., Sohn, S.W., Park, C., Seo, D.H., Kim, S.J.: Visual cryptography based on an interferometric encryption technique. ETRI J. 24(5), 373\u2013380 (2002)","journal-title":"ETRI J."},{"issue":"1","key":"25_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1093\/comjnl\/bxn072","volume":"53","author":"F Liu","year":"2010","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Some extensions on threshold visual cryptography schemes. Comput. J. 53(1), 107\u2013119 (2010)","journal-title":"Comput. J."},{"issue":"1","key":"25_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TIFS.2009.2037660","volume":"5","author":"F Liu","year":"2010","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27\u201338 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"25_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/iet-ifs.2008.0064","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Cheating immune visual cryptography scheme. IET Inf. Secur. 5(1), 51\u201359 (2011)","journal-title":"IET Inf. Secur."},{"key":"25_CR23","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.csi.2006.02.003","volume":"29","author":"DC Lou","year":"2007","unstructured":"Lou, D.C., Tso, H.K., Liu, J.L.: A copyright protection scheme for digital images using visual cryptography technique. Comput. Stand. Interfaces 29, 125\u2013131 (2007)","journal-title":"Comput. Stand. Interfaces"},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TIT.1960.1057584","volume":"6","author":"M Plotkin","year":"1960","unstructured":"Plotkin, M.: Binary codes with specified minimum distances. IEEE Trans. Inf. Theory 6, 445\u2013450 (1960)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322\u2013336. Springer, Heidelberg (1997)"},{"key":"25_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"unstructured":"PureDepth.: Puredepth multi-layer display. http:\/\/www.puredepth.com. Accessed 15 March 2006","key":"25_CR27"},{"issue":"3","key":"25_CR28","first-page":"217","volume":"7","author":"PS Revenkar","year":"2010","unstructured":"Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Secure iris authentication using visual cryptography. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. 7(3), 217\u2013221 (2010)","journal-title":"(IJCSIS) Int. J. Comput. Sci. Inf. Secur."},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Technol. J. 29, 147\u2013160 (1950)","journal-title":"Bell Syst. Technol. J."},{"doi-asserted-by":"crossref","unstructured":"De Santis, A.: On visual cryptography schemes. In: Proceedings of the Information Theory Workshop 1998, pp. 154\u2013155. IEEE (1998)","key":"25_CR30","DOI":"10.1109\/ITW.1998.706491"},{"key":"25_CR31","first-page":"203","volume":"IT\u20138","author":"S Johnson","year":"1962","unstructured":"Johnson, S.: A new upper bound for error correction codes. IRE Trans. IT\u20138, 203\u2013207 (1962)","journal-title":"IRE Trans."},{"issue":"4","key":"25_CR32","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/TCE.2005.1561845","volume":"51","author":"S Sudharsanan","year":"2005","unstructured":"Sudharsanan, S.: Shared key encryption of jpeg color images. IEEE Trans. Consum. Electron. 51(4), 1204\u20131211 (2005)","journal-title":"IEEE Trans. Consum. Electron."},{"unstructured":"Tuyls, P., Hollmann, H.D.L., Lint, H.H.V., Tolhuizen, L.: A polarisation based visual crypto system and its secret sharing schemes (2002). http:\/\/eprint.iacr.org","key":"25_CR33"},{"key":"25_CR34","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"37","author":"P Tuyls","year":"2005","unstructured":"Tuyls, P., Hollmann, H.D.L., van Lint, J.H., Tolhuizen, L.: Xor-based visual cryptography schemes. Des. Codes Cryptogr. 37, 169\u2013186 (2005)","journal-title":"Des. Codes Cryptogr."},{"doi-asserted-by":"crossref","unstructured":"Tuyls, P., Kevenaar, T., Schrijen, G.J., Staring, T., van Dijk, M.: Security displaysenabling secure communications. In: First International Conference on Pervasive Computing, Boppard, Germany LNCS, vol. 2802, pp. 271\u2013284. Springer, Heidelberg (2004)","key":"25_CR35","DOI":"10.1007\/978-3-540-39881-3_23"},{"key":"25_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-540-24660-2_27","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"DQ Viet","year":"2004","unstructured":"Viet, D.Q., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 353\u2013365. Springer, Heidelberg (2004)"},{"key":"25_CR37","first-page":"166","volume":"5","author":"VI Levenshtein","year":"1964","unstructured":"Levenshtein, V.I.: The application of hadamard matrixes to a problem in coding. Probl. Cybern. 5, 166\u2013184 (1964)","journal-title":"Probl. Cybern."},{"key":"25_CR38","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1016\/j.ins.2006.12.025","volume":"177","author":"FH Wang","year":"2007","unstructured":"Wang, F.H., Yen, K.K., Jain, L.C., Pan, J.S.: Multiuser-based shadow watermark extraction system. Inf. Sci. 177, 2522\u20132532 (2007)","journal-title":"Inf. Sci."},{"unstructured":"Patent with International Application No.: PCT\/IB2003\/000261: Secure Visual Message Communication Method And Device (2003)","key":"25_CR39"},{"key":"25_CR40","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"25_CR41","doi-asserted-by":"crossref","first-page":"189","DOI":"10.3233\/ICA-2006-13207","volume":"13","author":"CN Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S., Ching, M.H.: Embed additional private information into two-dimensional bar codes by the visual secret sharing scheme. Integr. Comput. Aided Eng. 13(2), 189\u2013199 (2006)","journal-title":"Integr. Comput. Aided Eng."},{"issue":"2","key":"25_CR42","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TCSVT.2013.2276708","volume":"24","author":"CN Yang","year":"2014","unstructured":"Yang, C.N., Wang, D.: Property analysis of xor based visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 24(2), 189\u2013197 (2014)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"25_CR43","volume-title":"Coding and Cryptography (in Chinese)","author":"YX Yang","year":"1992","unstructured":"Yang, Y.X., Lin, X.D.: Coding and Cryptography (in Chinese). Posts and Telecom Press, Beijing (1992)"},{"issue":"2","key":"25_CR44","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1049\/iet-ifs.2009.0183","volume":"5","author":"F Liu","year":"2010","unstructured":"Liu, F., Wu, C.: A robust visual cryptography based watermarking scheme for multiple cover images and multiple owners. IET Inf. Secur. 5(2), 121\u2013128 (2010)","journal-title":"IET Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19321-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T03:44:51Z","timestamp":1748403891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19321-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193205","9783319193212"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19321-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}