{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:51:39Z","timestamp":1725871899702},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_11","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T12:34:29Z","timestamp":1479904469000},"page":"212-224","source":"Crossref","is-referenced-by-count":6,"title":["Enhanced Modulo Based Multi Secret Image Sharing Scheme"],"prefix":"10.1007","author":[{"given":"Maroti","family":"Deshmukh","sequence":"first","affiliation":[]},{"given":"Neeta","family":"Nain","sequence":"additional","affiliation":[]},{"given":"Mushtaq","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-32009-5_10","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A Beimel","year":"2012","unstructured":"Beimel, A., Farr\u00e0s, O., Mintz, Y.: Secret sharing schemes for very dense graphs. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 144\u2013161. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32009-5_10"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Proceeding of the National Computer Conference 1979, vol. 48, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-48658-5_17","volume-title":"Advances in Cryptology \u2014 CRYPTO 1994","author":"C Blundo","year":"1994","unstructured":"Blundo, C., Santis, A., Crescenzo, G., Gaggia, A.G., Vaccaro, U.: Multi-secret sharing schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 150\u2013163. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48658-5_17"},{"key":"11_CR4","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2014.01.001","volume":"92","author":"C-C Chen","year":"2014","unstructured":"Chen, C.-C., Wu, W.-J.: A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 92, 107\u2013114 (2014)","journal-title":"J. Syst. Softw."},{"issue":"7","key":"11_CR5","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T-H Chen","year":"2011","unstructured":"Chen, T.-H., Tsao, K.-H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"11_CR6","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.sigpro.2010.06.012","volume":"91","author":"T-H Chen","year":"2011","unstructured":"Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on boolean operations. Signal Process. 91(1), 90\u201397 (2011)","journal-title":"Signal Process."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Deshmukh, M., Nain, N., Ahmed, M.: An (n, n)-multi secret image sharing scheme using boolean XOR and modular arithmetic. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 690\u2013697. IEEE (2016)","DOI":"10.1109\/AINA.2016.56"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Deshmukh, M., Nain, N., Ahmed, M.: A novel approach of an (n, n) multi secret image sharing scheme using additive modulo. In: International Conference on Computer Vision and Image Processing (2016)","DOI":"10.1007\/978-981-10-2104-6_14"},{"issue":"4","key":"11_CR9","first-page":"91","volume":"8","author":"M Deshmukh","year":"2014","unstructured":"Deshmukh, M., Prasad, M.: Comparative study of visual secret sharing schemes to protect iris image. Int. J. Inf. Process. 8(4), 91\u201398 (2014)","journal-title":"Int. J. Inf. Process."},{"issue":"1","key":"11_CR10","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s11277-013-1511-3","volume":"77","author":"C-F Hsu","year":"2014","unstructured":"Hsu, C.-F., Harn, L., Cui, G.: An ideal multi-secret sharing scheme based on connectivity of graphs. Wireless Pers. Commun. 77(1), 383\u2013394 (2014)","journal-title":"Wireless Pers. Commun."},{"issue":"3","key":"11_CR11","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1002\/sec.769","volume":"7","author":"S Kumar","year":"2014","unstructured":"Kumar, S., Sharma, R.K.: Threshold visual secret sharing based on boolean operations. Secur. Commun. Netw. 7(3), 653\u2013664 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"11_CR12","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.ins.2014.07.016","volume":"288","author":"K-S Lin","year":"2014","unstructured":"Lin, K.-S., Lin, C.-H., Chen, T.-H.: Distortionless visual multi-secret sharing based on random grid. Inf. Sci. 288, 330\u2013346 (2014)","journal-title":"Inf. Sci."},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi: 10.1007\/BFb0053419"},{"key":"11_CR14","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/j.procs.2016.06.034","volume":"89","author":"M Rajput","year":"2016","unstructured":"Rajput, M., Deshmukh, M.: Secure (n, n+1)-multi secret image sharing scheme using additive modulo. Procedia Comput. Sci. 89, 677\u2013683 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"11","key":"11_CR15","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"3","key":"11_CR16","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40(3), 1014\u20131031 (2007)","journal-title":"Pattern Recogn."},{"issue":"10","key":"11_CR17","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recogn. 40(10), 2776\u20132785 (2007)","journal-title":"Pattern Recogn."},{"key":"11_CR18","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jss.2015.01.031","volume":"116","author":"Enhanced boolean-based multi secret image sharing scheme","year":"2016","unstructured":"Enhanced boolean-based multi secret image sharing scheme: C.-N. Yang, C.-H. Chen, and S.-R. Cai. Journal of Systems and software 116, 22\u201334 (2016)","journal-title":"Journal of Systems and software"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T22:11:19Z","timestamp":1568585479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}