{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:16Z","timestamp":1725852436121},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_34","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"418-432","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion"],"prefix":"10.1007","author":[{"given":"Wen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Teng","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"34_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"34_CR2","first-page":"127","volume-title":"Visual Cryptography for Image Processing and Security","author":"Feng Liu","year":"2014","unstructured":"Liu, F., Yan, W.Q.: Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications, pp. 1-143. Springer, Switzerland (2014). ISBN 978-3-319-09643-8"},{"issue":"10","key":"34_CR3","first-page":"2172","volume":"82","author":"H Kuwakado","year":"1999","unstructured":"Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fund. Electron. Commun. Comput. Sci. 82(10), 2172\u20132177 (1999)","journal-title":"IEICE Trans. Fund. Electron. Commun. Comput. Sci."},{"issue":"4","key":"34_CR4","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"key":"34_CR6","first-page":"95","volume":"1","author":"YC Hou","year":"2004","unstructured":"Hou, Y.C., Tu, S.F.: Visual cryptography techniques for color images without pixel expansion. J. Inf. Technol. Soc. 1, 95\u2013110 (2004). (in Chinese)","journal-title":"J. Inf. Technol. Soc."},{"issue":"72","key":"34_CR7","first-page":"179","volume":"37","author":"YC Hou","year":"2005","unstructured":"Hou, Y.C., Tu, S.F.: A visual cryptographic technique for chromatic images using multi-pixel encoding method. J. Res. Pract. Inf. Technol. 37(72), 179\u2013192 (2005)","journal-title":"J. Res. Pract. Inf. Technol."},{"issue":"1","key":"34_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97\u2013107 (2006)","journal-title":"Comput. J."},{"issue":"2","key":"34_CR9","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1179\/174313107X165290","volume":"55","author":"SF Tu","year":"2007","unstructured":"Tu, S.F., Hou, Y.C.: Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images. The Imaging Sci. J. 55(2), 90\u2013101 (2007)","journal-title":"The Imaging Sci. J."},{"issue":"21","key":"34_CR10","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","volume":"177","author":"YF Chen","year":"2007","unstructured":"Chen, Y.F., Chan, Y.K., Huang, C.C., Tsai, M.H., Chu, Y.P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696\u20134710 (2007)","journal-title":"Inf. Sci."},{"issue":"8","key":"34_CR11","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1016\/j.jvcir.2010.08.006","volume":"21","author":"SJ Lin","year":"2010","unstructured":"Lin, S.J., Chen, S.K., Lin, J.C.: Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Represent. 21(8), 900\u2013916 (2010)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2","key":"34_CR12","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F Liu","year":"2012","unstructured":"Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331\u2013342 (2012)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"7","key":"34_CR13","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"TH Chen","year":"2011","unstructured":"Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"issue":"8","key":"34_CR14","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094\u20132109 (2013)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"34_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1049\/iet-ipr.2012.0338","volume":"7","author":"YS Lee","year":"2013","unstructured":"Lee, Y.S., Wang, B.J., Chen, T.H.: Quality-improved threshold visual secret sharing scheme by random grids. IET Image Process. 7(2), 137\u2013143 (2013)","journal-title":"IET Image Process."},{"issue":"5","key":"34_CR16","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.jvcir.2013.03.002","volume":"24","author":"XT Wu","year":"2013","unstructured":"Wu, X.T., Liu, T., Sun, W.: Improving the visual quality of random grid-based visual secret sharing via error diffusion. J. Vis. Commun. Image Represent. 24(5), 552\u2013566 (2013)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"4","key":"34_CR17","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIFS.2014.2305574","volume":"9","author":"R Prisco De","year":"2014","unstructured":"De Prisco, R., De Santis, A.: On the relation of random grid and deterministic visual cryptography. IEEE Trans. Inf. Forensics Secur. 9(4), 653\u2013665 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.tcs.2014.10.048","volume":"565","author":"SJ Shyu","year":"2015","unstructured":"Shyu, S.J.: Visual cryptograms of random grids for threshold access structures. Theoret. Comput. Sci. 565, 30\u201349 (2015)","journal-title":"Theoret. Comput. Sci."},{"key":"34_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-32205-1_18","volume-title":"Digital Forensics and Watermarking","author":"F Liu","year":"2012","unstructured":"Liu, F., Guo, T., Wu, C.K., Yang, C.-N.: Flexible visual cryptography scheme without distortion. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 211\u2013227. Springer, Heidelberg (2012)"},{"issue":"5","key":"34_CR20","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s00779-012-0535-0","volume":"17","author":"CN Yang","year":"2013","unstructured":"Yang, C.N., Chen, P.W., Shih, H.W., Kim, C.: Aspect ratio invariant visual cryptography by image filtering and resizing. Pers. Ubiquit. Comput. 17(5), 843\u2013850 (2013)","journal-title":"Pers. Ubiquit. Comput."},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Li, P., Ma, P.J., Li, D.: Aspect ratio invariant visual cryptography scheme with optional size expansion. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 219\u2013222. IEEE (2012)","DOI":"10.1109\/IIH-MSP.2012.59"},{"issue":"2","key":"34_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"CN Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn. Lett. 26(2), 193\u2013206 (2005)","journal-title":"Pattern Recogn. Lett."},{"issue":"7","key":"34_CR23","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.patcog.2006.01.013","volume":"39","author":"CN Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn. 39(7), 1300\u20131314 (2006)","journal-title":"Pattern Recogn."},{"key":"34_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ins.2015.03.024","volume":"312","author":"CN Yang","year":"2015","unstructured":"Yang, C.N., Lin, C.Y.: Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels. Inf. Sci. 312, 131\u2013151 (2015)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T19:31:17Z","timestamp":1559417477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}