{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:38:38Z","timestamp":1725867518647},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319472379"},{"type":"electronic","value":"9783319472386"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47238-6_2","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T14:36:56Z","timestamp":1475591816000},"page":"20-39","source":"Crossref","is-referenced-by-count":4,"title":["Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[]},{"given":"Roberto","family":"De Prisco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-540-24582-7_11","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"A Adhikari","year":"2003","unstructured":"Adhikari, A., Sikdar, S.: A new (2,n)-visual threshold scheme for color images. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 148\u2013161. Springer, Heidelberg (2003)"},{"issue":"2","key":"2_CR2","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"issue":"1\u20132","key":"2_CR3","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theoret. Comput. Sci. 250(1\u20132), 143\u2013161 (2001)","journal-title":"Theoret. Comput. Sci."},{"issue":"1\u20133","key":"2_CR4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369(1\u20133), 169\u2013182 (2006)","journal-title":"Theoret. Comput. Sci."},{"issue":"2","key":"2_CR5","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16(2), 224\u2013261 (2003)","journal-title":"SIAM J. Discrete Math."},{"issue":"4","key":"2_CR6","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261\u2013289 (1999)","journal-title":"J. Cryptol."},{"key":"2_CR7","unstructured":"Biham, E., Itzkovitz, A.: Visual cryptography with polarization. In: The Dagstuhl Seminar on Cryptography (1997) and Crypto 1998 RUMP Session (1998)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Secur. Priv. 38\u201347 (2004)","DOI":"10.1109\/MSECP.2004.1264852"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Chen, T.-H., Lee, Y.-S.: Yet another friendly progressive visual secret sharing scheme. In: 5th International Conference Intelligent Information Hiding and Multimedia Signal Processing, pp. 353\u2013356 (2009)","DOI":"10.1109\/IIH-MSP.2009.135"},{"issue":"9","key":"2_CR10","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"T-H Chen","year":"2009","unstructured":"Chen, T.-H., Tsao, K.-H.: Visual secret random grids sharing revisited. Pattern Recogn. 42(9), 2203\u20132217 (2009)","journal-title":"Pattern Recogn."},{"issue":"7","key":"2_CR11","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T-H Chen","year":"2011","unstructured":"Chen, T.-H., Tsao, K.-H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"key":"2_CR12","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Optimal colored threshold visual cryptography schemes. Des. Codes Crypt. 35, 311\u2013335 (2005)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"2_CR13","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97\u2013107 (2006)","journal-title":"Comput. J."},{"issue":"1\u20133","key":"2_CR14","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S Cimato","year":"2007","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoret. Comput. Sci. 374(1\u20133), 261\u2013276 (2007)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"2_CR15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.ipl.2004.10.011","volume":"93","author":"S Cimato","year":"2005","unstructured":"Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199\u2013206 (2005)","journal-title":"Inf. Process. Lett."},{"key":"2_CR16","volume-title":"Visual Cryptography and Secret Image Sharing","author":"S Cimato","year":"2012","unstructured":"Cimato, S., Yang, C.-N.: Visual Cryptography and Secret Image Sharing. CRC Press, Boca Raton (2012). ISBN: 978-1-4398-3721-4"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-04268-8_2","volume-title":"Information Theoretic Security","author":"P D\u2019Arco","year":"2014","unstructured":"D\u2019Arco, P., Prisco, R.: Secure two-party computation: a visual way. In: Padr\u00f3, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 18\u201338. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-04268-8_2"},{"key":"2_CR18","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jss.2014.03.079","volume":"95","author":"P D\u2019Arco","year":"2014","unstructured":"D\u2019Arco, P., De Prisco, R., De Santis, A.: Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95, 89\u201399 (2014)","journal-title":"J. Syst. Softw."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"D\u2019Arco, P., De Prisco, R., Desmedt, Y.: Private visual share-homomorphic computation and randomness reduction in visual cryptography. In: ICITS 2016, 9\u201312 August 2016, Tacoma, Washington, USA (2016)","DOI":"10.1007\/978-3-319-49175-2_5"},{"issue":"3","key":"2_CR20","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.tcs.2003.12.018","volume":"314","author":"A Bonis De","year":"2004","unstructured":"De Bonis, A., De Santis, A.: Randomness in secret sharing and visual cryptography schemes. Theoret. Comput. Sci. 314(3), 351\u2013374 (2004)","journal-title":"Theoret. Comput. Sci."},{"issue":"9","key":"2_CR21","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1093\/comjnl\/bxp068","volume":"53","author":"R Prisco De","year":"2009","unstructured":"De Prisco, R., De Santis, A.: Cheating immune threshold visual secret sharing. Comput. J. 53(9), 1485\u20131496 (2009)","journal-title":"Comput. J."},{"issue":"28","key":"2_CR22","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.tcs.2013.09.005","volume":"510","author":"R Prisco De","year":"2013","unstructured":"De Prisco, R., De Santis, A.: Color visual cryptography schemes for black and white secret images. Theoret. Comput. Sci. 510(28), 62\u201386 (2013)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"2_CR23","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIFS.2014.2305574","volume":"9","author":"R Prisco De","year":"2014","unstructured":"De Prisco, R., De Santis, A.: On the relation of random grid and deterministic visual cryptography. IEEE Trans. Inf. Forensics Secur. 9(4), 653\u2013665 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR24","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"PA Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Cods Crypt. 25, 15\u201361 (2002)","journal-title":"Des. Cods Crypt."},{"issue":"4","key":"2_CR25","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1016\/j.patcog.2007.09.004","volume":"41","author":"WP Fang","year":"2008","unstructured":"Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recogn. 41(4), 1410\u20131414 (2008)","journal-title":"Pattern Recogn."},{"issue":"12","key":"2_CR26","doi-asserted-by":"crossref","first-page":"3572","DOI":"10.1016\/j.patcog.2008.05.031","volume":"41","author":"J-B Feng","year":"2008","unstructured":"Feng, J.-B., Wu, H.-C., Tsai, C.-S., Chang, Y.-F., Chu, Y.-P.: Visual secret sharing for multiple secrets. Pattern Recogn. 41(12), 3572\u20133581 (2008)","journal-title":"Pattern Recogn."},{"issue":"2","key":"2_CR27","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal $$k$$ out of $$n$$ secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240(2), 471\u2013485 (2000)","journal-title":"Theoret. Comput. Sci."},{"issue":"2","key":"2_CR28","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G Horng","year":"2006","unstructured":"Horng, G., Chen, T.-H., Tsai, D.-S.: Cheating in visual cryptography. Des. Codes Crypt. 38(2), 219\u2013236 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"7","key":"2_CR29","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y-C Hou","year":"2003","unstructured":"Hou, Y.-C.: Visual cryptography for color images. Pattern Recognit. 36(7), 1619\u20131629 (2003)","journal-title":"Pattern Recognit."},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/11556992_22","volume-title":"Information Security","author":"C-M Hu","year":"2005","unstructured":"Hu, C.-M., Tzeng, W.-G.: Compatible ideal contrast visual cryptography schemes with reversing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 300\u2013313. Springer, Heidelberg (2005). doi: 10.1007\/11556992_22"},{"issue":"1","key":"2_CR31","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"C Hu","year":"2007","unstructured":"Hu, C., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36\u201345 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"2_CR32","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377\u2013379 (1987)","journal-title":"Opt. Lett."},{"issue":"5","key":"2_CR33","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1016\/j.ic.2006.12.005","volume":"205","author":"A Klein","year":"2007","unstructured":"Klein, A., Wessler, M.: Extended visual cryptography schemes. Inf. Comput. 205(5), 716\u2013732 (2007)","journal-title":"Inf. Comput."},{"issue":"6","key":"2_CR34","first-page":"1262","volume":"81\u2013A","author":"H Koga","year":"1998","unstructured":"Koga, H., Yamamoto, H.: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 81\u2013A(6), 1262\u20131269 (1998)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/11593447_8","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"V Kolesnikov","year":"2005","unstructured":"Kolesnikov, V.: Gate evaluation secret sharing and secure one-round two-party computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 136\u2013155. Springer, Heidelberg (2005). doi: 10.1007\/11593447_8"},{"issue":"3","key":"2_CR36","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1017\/S096354830200559X","volume":"12","author":"M Krause","year":"2003","unstructured":"Krause, M., Simon, H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb. Probab. Comput. 12(3), 285\u2013299 (2003)","journal-title":"Comb. Probab. Comput."},{"key":"2_CR37","unstructured":"Kuhlmann, C., Simon, H.U.: Construction of visual secret sharing schemes with almost optimal contrast. In: 11th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, USA, pp. 262\u2013272 (2000)"},{"issue":"1","key":"2_CR38","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2011.2167611","volume":"7","author":"K-H Lee","year":"2012","unstructured":"Lee, K.-H., Chiu, P.-L.: An extended visual cryptography algorithm for general access structures. IEEE Trans. Inf. Forensics Secur. 7(1), 219\u2013229 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"2_CR39","doi-asserted-by":"crossref","first-page":"373","DOI":"10.4218\/etrij.02.0102.0505","volume":"24","author":"S-S Lee","year":"2002","unstructured":"Lee, S.-S., Na, J.-C., Sohn, S.-W., Park, C., Seo, D.-H., Kim, S.-J.: Visual cryptography based on interferometric encryption technique. ETRI J. 24(5), 373\u2013380 (2002)","journal-title":"ETRI J."},{"issue":"7","key":"2_CR40","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.ipl.2010.01.003","volume":"110","author":"F Liu","year":"2010","unstructured":"Liu, F., Wua, C., Lin, X.: A new definition of the contrast of visual cryptography scheme. Inf. Process. Lett. 110(7), 241\u2013246 (2010)","journal-title":"Inf. Process. Lett."},{"key":"2_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-319-19321-2_25","volume-title":"Digital-Forensics and Watermarking","author":"F Liu","year":"2015","unstructured":"Liu, F., Wu, C.K.: Optimal XOR based (2,n)-visual cryptography schemes. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 333\u2013349. Springer, Heidelberg (2015)"},{"issue":"1","key":"2_CR42","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10878-009-9241-x","volume":"21","author":"S Lu","year":"2011","unstructured":"Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Comb. Optim. 21(1), 47\u201366 (2011)","journal-title":"J. Comb. Optim."},{"key":"2_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"M Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322\u2013336. Springer, Heidelberg (1997). doi: 10.1007\/BFb0052245"},{"key":"2_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi: 10.1007\/BFb0053419"},{"issue":"12","key":"2_CR45","doi-asserted-by":"crossref","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"S-J Shyu","year":"2007","unstructured":"Shyu, S.-J., Huang, S.-Y., Lee, Y.-K., Wang, R.-Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633\u20133651 (2007)","journal-title":"Pattern Recogn."},{"key":"2_CR46","unstructured":"Stinson, D.: Visual cryptography and threshold schemes. Dr. Dobbs J. (1998). http:\/\/www.drdobbs.com\/visual-cryptography-threshold-schemes\/184410530"},{"key":"2_CR47","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"27","author":"P Tulys","year":"2005","unstructured":"Tulys, P., Hollman, H.D., van Lint, J.H., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Crypt. 27, 169\u2013186 (2005)","journal-title":"Des. Codes Crypt."},{"key":"2_CR48","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"ER Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of $$k$$ out of $$n$$ visual secret schemes. Des. Codes Crypt. 11, 179\u2013196 (1997)","journal-title":"Des. Codes Crypt."},{"key":"2_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-540-24660-2_27","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"DQ Viet","year":"2004","unstructured":"Viet, D.Q., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 353\u2013365. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24660-2_27"},{"issue":"4","key":"2_CR50","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C-N Yang","year":"2004","unstructured":"Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"9","key":"2_CR51","doi-asserted-by":"crossref","first-page":"2471","DOI":"10.1093\/ietfec\/e88-a.9.2471","volume":"E88\u2013A","author":"C-N Yang","year":"2005","unstructured":"Yang, C.-N., Chen, T.-S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E88\u2013A(9), 2471\u20132474 (2005)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"2","key":"2_CR52","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"C-N Yang","year":"2005","unstructured":"Yang, C.-N., Chen, T.-S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn. Lett. 26(2), 193\u2013206 (2005)","journal-title":"Pattern Recogn. Lett."},{"key":"2_CR53","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C-N Yang","year":"2000","unstructured":"Yang, C.-N., Laih, C.-S.: New colored visual secret sharing schemes. Des. Codes Crypt. 20, 325\u2013335 (2000)","journal-title":"Des. Codes Crypt."},{"issue":"6","key":"2_CR54","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1093\/comjnl\/bxm118","volume":"51","author":"C-N Yang","year":"2008","unstructured":"Yang, C.-N., Wang, C.-C., Chen, T.-S.: Visual cryptography schemes with reversing. Comput. J. 51(6), 710\u2013722 (2008)","journal-title":"Comput. J."},{"issue":"28","key":"2_CR55","first-page":"123","volume":"134","author":"HC Wu","year":"2005","unstructured":"Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 134(28), 123\u2013135 (2005)","journal-title":"Comput. Stand. Interfaces"},{"key":"2_CR56","unstructured":"Wu, C.-C., Chen, L.-H.: A study on visual cryptography. Master thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)"},{"issue":"5","key":"2_CR57","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1016\/j.jss.2011.12.041","volume":"85","author":"X Wu","year":"2012","unstructured":"Wu, X., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5), 1119\u20131134 (2012)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47238-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:20:07Z","timestamp":1498335607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47238-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319472379","9783319472386"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47238-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}