{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:22:08Z","timestamp":1742912528059,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319534640"},{"type":"electronic","value":"9783319534657"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_18","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"238-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collusive Attacks to Partition Authentication Visual Cryptography Scheme"],"prefix":"10.1007","author":[{"given":"Yawei","family":"Ren","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi:10.1007\/BFb0053419"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Visual cryptography for general access structures. Inf. Comput. 129, 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"issue":"1\u20132","key":"18_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1\u20132), 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TIFS.2011.2116782","volume":"6","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307\u2013322 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"18_CR5","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/LSP.2011.2166543","volume":"18","author":"RZ Wang","year":"2011","unstructured":"Wang, R.Z., Hsu, S.F.: Tagged visual cryptography. IEEE Signal Process. Lett. 18(11), 627\u2013630 (2011)","journal-title":"IEEE Signal Process. Lett."},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-662-43886-2_6","volume-title":"Digital-Forensics and Watermarking","author":"D Ou","year":"2014","unstructured":"Ou, D., Wu, X., Dai, L., Sun, W.: Improved tagged visual cryptograms by using random grids. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 79\u201394. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-43886-2_6"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-319-31960-5_35","volume-title":"Digital-Forensics and Watermarking","author":"Y Ren","year":"2016","unstructured":"Ren, Y., Liu, F., Lin, D., Feng, R., Wang, W.: A new construction of tagged visual cryptography scheme. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 433\u2013445. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-31960-5_35"},{"issue":"11","key":"18_CR8","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1109\/TCSVT.2011.2106291","volume":"21","author":"YC Hou","year":"2011","unstructured":"Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circ. Syst. Video Technol. 21(11), 1760\u20131764 (2011)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.sigpro.2014.06.011","volume":"105","author":"XH Yan","year":"2014","unstructured":"Yan, X.H., Wang, S., Niu, X.M.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process. 105, 389\u2013398 (2014)","journal-title":"Signal Process."},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"979","DOI":"10.4218\/etrij.15.0114.0327","volume":"37","author":"CN Yang","year":"2015","unstructured":"Yang, C.N., Wu, C.C., Lin, Y.C., Kim, C.: Constructions and properties of general (k, n) block-based progressive visual cryptography. ETRI J. 37, 979\u2013989 (2015)","journal-title":"ETRI J."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40, 1014\u20131031 (2007)","journal-title":"Pattern Recogn."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T Chen","year":"2011","unstructured":"Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"issue":"8","key":"18_CR13","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.K.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094\u20132109 (2013)","journal-title":"J. Syst. Softw."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93, 977\u2013995 (2013)","journal-title":"Signal Process."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G Horng","year":"2006","unstructured":"Horng, G., Chen, T.H., Tsai, D.S.: Cheating in visual cryptography. Design. Code. Crypt. 38, 219\u2013236 (2006)","journal-title":"Design. Code. Crypt."},{"key":"18_CR16","unstructured":"Yang, C.N., Laih, C.S.: Some new types of visual secret sharing schemes. In: Proceedings of National Computer Symposium, vol. 3, pp. 260\u2013268 (1999)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11832072_15","volume-title":"Security and Cryptography for Networks","author":"R Prisco","year":"2006","unstructured":"Prisco, R., Santis, A.: Cheating immune (2, n)-threshold visual secret sharing. In: Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 216\u2013228. Springer, Heidelberg (2006). doi:10.1007\/11832072_15"},{"issue":"8","key":"18_CR18","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"DS Tsai","year":"2007","unstructured":"Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn. 40(8), 2356\u20132366 (2007)","journal-title":"Pattern Recogn."},{"issue":"1","key":"18_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2007","unstructured":"Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36\u201345 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"18_CR20","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1093\/comjnl\/bxp068","volume":"53","author":"R De Prisco","year":"2010","unstructured":"De Prisco, R., De Santis, A.: Cheating immune threshold visual secret sharing. Comput. J. 53(9), 1485\u20131496 (2010)","journal-title":"Comput. J."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/iet-ifs.2008.0064","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Cheating immune visual cryptography scheme. IET Inform. Secur. 5, 51\u201359 (2011)","journal-title":"IET Inform. Secur."},{"issue":"7","key":"18_CR22","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1109\/TIP.2012.2190082","volume":"21","author":"YC Chen","year":"2012","unstructured":"Chen, Y.C., Horng, G., Tsai, D.S.: Comment on \u201ccheating prevention in visual cryptograph\u201d. IEEE Trans. Image Process. 21(7), 3319\u20133323 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/j.jvcir.2012.08.006","volume":"23","author":"YC Chen","year":"2012","unstructured":"Chen, Y.C., Tsai, D.S., Horng, G.: A new authentication based cheating prevention scheme in Naor-Shamir\u2019s visual cryptography. J. Vis. Commun. Image R. 23, 1225\u20131233 (2012)","journal-title":"J. Vis. Commun. Image R."},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1016\/j.jvcir.2014.06.011","volume":"25","author":"CH Lin","year":"2014","unstructured":"Lin, C.H., Chen, T.H., Wu, Y.T., Tsao, K.H., Lin, K.S.: Multi-factor cheating prevention in visual secret sharing by hybrid codebooks. J. Vis. Commun. Image R. 25, 1543\u20131557 (2014)","journal-title":"J. Vis. Commun. Image R."},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2014.12.046","volume":"301","author":"PY Lin","year":"2015","unstructured":"Lin, P.Y., Wang, R.Z., Chang, Y.J., Fang, W.P.: Prevention of cheating in visual cryptography by using coherent image. Inf. Sci. 301, 61\u201374 (2015)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:25:57Z","timestamp":1709821557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}