{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:39:01Z","timestamp":1742985541235,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_43","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"476-486","source":"Crossref","is-referenced-by-count":2,"title":["Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme"],"prefix":"10.1007","author":[{"given":"Roshni Kadeparambil","family":"Raphel","sequence":"first","affiliation":[]},{"given":"H.","family":"Muhammed Ilyas","sequence":"additional","affiliation":[]},{"given":"Janu R.","family":"Panicker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"43_CR2","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C Thien","year":"2002","unstructured":"Thien, C., Lin, J.: Secret image sharing. Comput. Graph 26, 765\u2013770 (2002)","journal-title":"Comput. Graph"},{"key":"43_CR3","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"R Wang","year":"2006","unstructured":"Wang, R., Su, C.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27, 551\u2013555 (2006)","journal-title":"Pattern Recogn. Lett."},{"key":"43_CR4","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C Yang","year":"2004","unstructured":"Yang, C.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"key":"43_CR5","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1016\/j.patcog.2007.09.004","volume":"41","author":"W-P Fang","year":"2008","unstructured":"Fang, W.-P.: Friendly progressive visual secret sharing. Pattern Recogn. 41, 1410\u20131414 (2008)","journal-title":"Pattern Recogn."},{"key":"43_CR6","unstructured":"Pang, L., Li, H., Yao, Y., Wang, Y.: A Verifiable (t, n) multiple secret sharing scheme and its analyses. In: International Symposium on Electronic Commerce and Security (2008). 978-0-7695-3258-5\/08"},{"key":"43_CR7","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1016\/j.jvcir.2010.08.006","volume":"21","author":"SJ Lin","year":"2010","unstructured":"Lin, S.J., Chen, S.K., Lin, J.C.: Flip visual cryptography (fvc) with perfect security, conditionally-optimal contrast, and no expansion\". J. Vis. Commun. Image Representation 21, 900\u2013916 (2010)","journal-title":"J. Vis. Commun. Image Representation"},{"key":"43_CR8","unstructured":"Weir, J., Yan, W.: Sharing Multiple Secrets Using Visual Cryptography. IEEE (2009). 78-1-4244-3828-0\/09"},{"key":"43_CR9","unstructured":"Chen, L.H., Wu, C.C.: A study on visual cryptography, Master Thesis, National Chiao Tung University, Taiwan, ROC (1998)"},{"key":"43_CR10","unstructured":"Hsu, H.C., Chen, T.S., Lin, Y.H.: The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996\u20131001, March 2004"},{"key":"43_CR11","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1016\/j.patcog.2008.05.031","volume":"41","author":"J Feng","year":"2008","unstructured":"Feng, J., Wu, H., Tsai, C., Chang, Y., Chu, Y.: Visual secret sharing for multiple secrets. Pattern Recogn. 41, 3572\u20133581 (2008)","journal-title":"Pattern Recogn."},{"key":"43_CR12","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.csi.2004.12.006","volume":"28","author":"W Hsien-Chu","year":"2005","unstructured":"Hsien-Chu, W., Chang, C.-C.: Sharing visual multi-secrets using circle shares. Comput. Stan. Interfaces 28, 123\u2013135 (2005)","journal-title":"Comput. Stan. Interfaces"},{"key":"43_CR13","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"S Shyu","year":"2007","unstructured":"Shyu, S., Huang, S., Lee, Y., Wang, R., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40, 3633\u20133651 (2007)","journal-title":"Pattern Recogn."},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Ulutas, M.: Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme, Hindawi Publishing Corporation, Mathematical Problems in Engineering, vol. 2010, Article ID 593236 (2010)","DOI":"10.1155\/2010\/593236"},{"key":"43_CR15","first-page":"173","volume":"52","author":"O Takizawa","year":"2005","unstructured":"Takizawa, O., Yamamura, A., Makino, K.: Secret sharing scheme using natural language text. J. Nat. Inst. Inf. Commun. Technol. 52, 173\u2013183 (2005)","journal-title":"J. Nat. Inst. Inf. Commun. Technol."},{"key":"43_CR16","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.jvcir.2013.01.003","volume":"24","author":"H-C Lin","year":"2013","unstructured":"Lin, H.-C., Yang, C.-N., Laih, C.-S., Lin, H.-T.: Natural language letter based visual cryptography scheme. J. Vis. Commun. Image R 24, 318\u2013331 (2013)","journal-title":"J. Vis. Commun. Image R"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:52:06Z","timestamp":1559303526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}