{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:25:47Z","timestamp":1742988347518,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319534640"},{"type":"electronic","value":"9783319534657"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_19","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"251-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["On the Robustness of Visual Cryptographic Schemes"],"prefix":"10.1007","author":[{"given":"Sabyasachi","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Partha Sarathi","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Avishek","family":"Adhikari","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"3","key":"19_CR1","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s10623-013-9832-5","volume":"73","author":"A Adhikari","year":"2014","unstructured":"Adhikari, A.: Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Crypt. 73(3), 865\u2013895 (2014)","journal-title":"Des. Codes Crypt."},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-30556-9_31","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"A Adhikari","year":"2004","unstructured":"Adhikari, A., Dutta, T.K., Roy, B.: A new black and white visual cryptographic scheme for general access structures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 399\u2013413. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-30556-9_31"},{"issue":"5","key":"19_CR3","first-page":"1998","volume":"E87\u2013A","author":"A Adhikari","year":"2004","unstructured":"Adhikari, A., Bose, M.: A new visual cryptographic scheme using latin squares. IEICE Trans. Fundam. E87\u2013A(5), 1998\u20132002 (2004)","journal-title":"IEICE Trans. Fundam."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Adhikari, A., Kumar, D, Bose, M., Roy, B.: Applications of partially balanced and balanced incomplete block designs in developing visual cryptographic schemes. IEICE Trans. Fundam. Japan E-90A(5), 949\u2013951 (2007)","DOI":"10.1093\/ietfec\/e90-a.5.949"},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10623-012-9722-2","volume":"71","author":"S Arumugam","year":"2014","unstructured":"Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-visual cryptography scheme. Des. Codes Crypt. 71(1), 153\u2013162 (2014)","journal-title":"Des. Codes Crypt."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: STOC 1988, pp. 1\u201310. ACM (1988)","DOI":"10.1145\/62212.62213"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS 1979, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"2","key":"19_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo, C., Darco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography. SIAM J. Discrete Math. 16(2), 224\u2013261 (2003)","journal-title":"SIAM J. Discrete Math."},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-29011-4_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A Cevallos","year":"2012","unstructured":"Cevallos, A., Fehr, S., Ostrovsky, R., Rabani, Y.: Unconditionally-secure robust secret sharing with compact shares. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 195\u2013208. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-29011-4_13"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201996","author":"S Droste","year":"1996","unstructured":"Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 401\u2013415. Springer, Heidelberg (1996). doi:10.1007\/3-540-68697-5_30"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-319-21966-0_17","volume-title":"Information and Communications Security","author":"S Dutta","year":"2015","unstructured":"Dutta, S., Adhikari, A.: XOR based non-monotone t-$$(k,n)^*$$-visual cryptographic schemes using linear algebra. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2014. LNCS, vol. 8958, pp. 230\u2013242. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-21966-0_17"},{"key":"19_CR12","doi-asserted-by":"publisher","unstructured":"Dutta, S., Rohit, R.S., Adhikari, A.: Constructions and analysis of some efficient $$t$$-$$(k, n)^*$$-visual cryptographic schemes using linear algebraic techniques. Accepted at the J. Des. Codes Crypt. 80(1), 165\u2013196 (2016). doi:10.1007\/s10623-015-0075-5 (Springer, US)","DOI":"10.1007\/s10623-015-0075-5"},{"issue":"2","key":"19_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G Horng","year":"2006","unstructured":"Horng, G., Chen, T.H., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Crypt. 38(2), 219\u2013236 (2006)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"19_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"C Hu","year":"2007","unstructured":"Hu, C., Tzeng, W.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36\u201345 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/iet-ifs.2008.0064","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Cheating immune visual cryptography scheme. IET Inf. Secur. 5(1), 51\u201359 (2011)","journal-title":"IET Inf. Secur."},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi:10.1007\/BFb0053419"},{"issue":"9","key":"19_CR17","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1093\/comjnl\/bxp068","volume":"53","author":"R De Prisco","year":"2010","unstructured":"De Prisco, R., De Santis, A.: Cheating immune threshold visual secret sharing. Comput. J. 53(9), 1485\u20131496 (2010)","journal-title":"Comput. J."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC 1989, pp. 73\u201385. ACM (1989)","DOI":"10.1145\/73007.73014"},{"issue":"11","key":"19_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Comm. ACM 22(11), 612\u2013613 (1979)","journal-title":"Comm. ACM"},{"issue":"3(pt. 2)","key":"19_CR20","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","volume":"6","author":"SJ Shyu","year":"2011","unstructured":"Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 6(3(pt. 2)), 960\u2013969 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"19_CR21","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"DS Tsai","year":"2007","unstructured":"Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn. 40(8), 2356\u20132366 (2007)","journal-title":"Pattern Recogn."},{"issue":"5","key":"19_CR22","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/j.jss.2011.12.041","volume":"85","author":"W Xiaotian","year":"2012","unstructured":"Xiaotian, W., Sun, W.: Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J. Syst. Softw. 85(5), 1119\u20131134 (2012)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:26:00Z","timestamp":1709821560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}