{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:32:44Z","timestamp":1761676364062},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_35","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"433-445","source":"Crossref","is-referenced-by-count":4,"title":["A New Construction of Tagged Visual Cryptography Scheme"],"prefix":"10.1007","author":[{"given":"Yawei","family":"Ren","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Rongquan","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"35_CR1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"PA Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25, 15\u201361 (2002)","journal-title":"Des. Codes Crypt."},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-36178-2_21","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"H Koga","year":"2002","unstructured":"Koga, H.: A general formula of the (\n                      \n                        \n                      \n                      $$t$$\n                      \n                        \n                          t\n                        \n                      \n                    ,\n                      \n                        \n                      \n                      $$n$$\n                      \n                        \n                          n\n                        \n                      \n                    )-Threshold visual secret sharing scheme. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 328\u2013345. Springer, Heidelberg (2002)"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369, 169\u2013182 (2006)","journal-title":"Theoret. Comput. Sci."},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","volume":"6","author":"SJ Shyu","year":"2011","unstructured":"Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6, 960\u2013969 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"35_CR6","first-page":"2172","volume":"82","author":"R Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Fundam. Electron. Commun. Comput. Sci. 82(10), 2172\u20132177 (1999)","journal-title":"IEICE Fundam. Electron. Commun. Comput. Sci."},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40, 1014\u20131031 (2007)","journal-title":"Pattern Recogn."},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"TH Chen","year":"2011","unstructured":"Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"issue":"9","key":"35_CR10","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TIFS.2013.2274955","volume":"8","author":"XT Wu","year":"2013","unstructured":"Wu, X.T., Sun, W.: Generalized random grid and its applications in visual cryptography. IEEE Trans. Inf. Forensics Secur. 8(9), 1541\u20131553 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1\u20132","key":"35_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1\u20132), 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"3071","DOI":"10.1016\/j.patcog.2009.02.015","volume":"42","author":"D Wang","year":"2009","unstructured":"Wang, D., Yi, F., Li, X.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42, 3071\u20133082 (2009)","journal-title":"Pattern Recogn."},{"issue":"2","key":"35_CR13","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TIFS.2011.2116782","volume":"6","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307\u2013322 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.sigpro.2013.06.003","volume":"94","author":"T Guo","year":"2014","unstructured":"Guo, T., Liu, F., Wu, C.K.: K out of k extended visual cryptography scheme by random grids. Signal Proc. 94, 90\u2013101 (2014)","journal-title":"Signal Proc."},{"key":"35_CR15","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.ins.2014.02.099","volume":"271","author":"CN Yang","year":"2014","unstructured":"Yang, C.N., Yang, Y.Y.: New extended visual cryptography schemes with clearer shadow images. Inf. Sci. 271, 246\u2013263 (2014)","journal-title":"Inf. Sci."},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.sigpro.2014.12.002","volume":"109","author":"XH Yan","year":"2015","unstructured":"Yan, X.H., Wang, S., Niu, X.M., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Proc. 109, 317\u2013333 (2015)","journal-title":"Signal Proc."},{"issue":"11","key":"35_CR17","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/LSP.2011.2166543","volume":"18","author":"RZ Wang","year":"2011","unstructured":"Wang, R.Z., Hsu, S.F.: Tagged visual cryptography. IEEE Signal Proc Lett. 18(11), 627\u2013630 (2011)","journal-title":"IEEE Signal Proc Lett."},{"key":"35_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-662-43886-2_6","volume-title":"Digital-Forensics and Watermarking","author":"D Ou","year":"2014","unstructured":"Ou, D., Wu, X., Dai, L., Sun, W.: Improved tagged visual cryptograms by using random grids. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 79\u201394. Springer, Heidelberg (2014)"},{"key":"35_CR19","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"1","author":"ER Verheul","year":"1997","unstructured":"Verheul, E.R., Van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing scheme. Des. Codes Crypt. 1, 179\u2013196 (1997)","journal-title":"Des. Codes Crypt."},{"key":"35_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ipl.2010.01.003","volume":"110","author":"F Liu","year":"2010","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: A new definition of the contrast of visual cryptography scheme. Inform. Process. Lett. 110, 241\u2013246 (2010)","journal-title":"Inform. Process. Lett."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T19:08:51Z","timestamp":1559416131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}