{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:14Z","timestamp":1725852434414},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_32","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"395-405","source":"Crossref","is-referenced-by-count":1,"title":["Authenticated Secret Sharing Scheme Based on GMEMD"],"prefix":"10.1007","author":[{"given":"Wen-Chung","family":"Kuo","sequence":"first","affiliation":[]},{"given":"Shao-Hung","family":"Kuo","sequence":"additional","affiliation":[]},{"given":"Hong-Yi","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Lih-Chyau","family":"Wuu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41, 3130\u20133137 (2008)","journal-title":"Pattern Recogn."},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.sigpro.2013.12.022","volume":"99","author":"CC Chang","year":"2014","unstructured":"Chang, C.C., Huynh, N.T., Le, H.D.: Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Sig. Process. 99, 159\u2013170 (2014)","journal-title":"Sig. Process."},{"issue":"4","key":"32_CR3","first-page":"22","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Comput. Soc. 8(4), 22\u201328 (2001)","journal-title":"IEEE Comput. Soc."},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.patrec.2011.09.030","volume":"33","author":"C Guo","year":"2012","unstructured":"Guo, C., Chang, C.C., Qin, C.: A hierarchical threshold secret image sharing. Pattern Recogn. Lett. 33, 83\u201391 (2012)","journal-title":"Pattern Recogn. Lett."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Kuo, W.C., Kuo, S.H., Wuu, L.C.: The high embedding steganographic method based on general Multi-EMD. In: 2012 International Conference on Information Security and Intelligent Control, pp. 286\u2013289, August 2012","DOI":"10.1109\/ISIC.2012.6449762"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1016\/j.patcog.2008.09.014","volume":"42","author":"PY Lin","year":"2009","unstructured":"Lin, P.Y., Lee, J.S., Chang, C.C.: Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn. 42, 886\u2013895 (2009)","journal-title":"Pattern Recogn."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","volume":"31","author":"PY Lin","year":"2010","unstructured":"Lin, P.Y., Chan, C.S.: Invertible secret image sharing with steganography. Pattern Recogn. Lett. 31, 1887\u20131893 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.jss.2012.09.027","volume":"86","author":"M Ulutas","year":"2013","unstructured":"Ulutas, M., Ulutas, G., Nabiyev, V.V.: Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 86, 485\u2013500 (2013)","journal-title":"J. Syst. Softw."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1016\/j.jss.2011.06.021","volume":"84","author":"CC Wu","year":"2011","unstructured":"Wu, C.C., Kao, S.J., Hwang, M.S.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84, 2196\u20132207 (2011)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T22:50:36Z","timestamp":1559429436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}