{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:28:38Z","timestamp":1773962918282,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540209966","type":"print"},{"value":"9783540246602","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_27","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"353-365","source":"Crossref","is-referenced-by-count":32,"title":["Almost Ideal Contrast Visual Cryptography with Reversing"],"prefix":"10.1007","author":[{"given":"Duong Quang","family":"Viet","sequence":"first","affiliation":[]},{"given":"Kaoru","family":"Kurosawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J.C. Benaloh","year":"1990","unstructured":"Benaloh, J.C., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201336. Springer, Heidelberg (1990)"},{"issue":"4","key":"27_CR3","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/S0097-8493(98)00034-X","volume":"22","author":"C. Blundo","year":"1998","unstructured":"Blundo, C., De. Santis, A.: Visual cryptography schemes with perfect reconstruction of black pixels. Computer and Graphics\u00a022(4), 449\u2013455 (1998)","journal-title":"Computer and Graphics"},{"issue":"4","key":"27_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo, C., De. Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology\u00a012(4), 261\u2013289 (1999)","journal-title":"Journal of Cryptology"},{"key":"27_CR5","unstructured":"Blundo, C., D\u2019Arco, P., De. Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics (to appear), Available from \n                    \n                      http:\/\/cacr.math.uwaterloo.ca\/~dstinson\/papers\/COTVCS.ps"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., De. Bonis, A., De. Santis, A.: Improved schemes for visual cryptography. Designs, Codes, and Cryptography\u00a024, 255\u2013278 (2001)","journal-title":"Designs, Codes, and Cryptography"},{"issue":"1","key":"27_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"P.A. Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels. Designs, Codes, and Cryptography\u00a025(1), 15\u201361 (2002)","journal-title":"Designs, Codes, and Cryptography"},{"issue":"1","key":"27_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/BF02620229","volume":"6","author":"M. Itoh","year":"1993","unstructured":"Itoh, M., Saito, A., Nishizeki, T.: Multiple assignment scheme for sharing secret. Journal of Cryptology\u00a06(1), 15\u201320 (1993)","journal-title":"Journal of Cryptology"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/3-540-62494-5_18","volume-title":"Security Protocols","author":"M. Naor","year":"1997","unstructured":"Naor, M., Shamir, A.: Visual cryptography II: Improving the Contrast Via the Cover Base. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 197\u2013202. Springer, Heidelberg (1997), Full version available from \n                    \n                      http:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/new_cov.ps"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Designs, Codes, and Cryptography\u00a011(2), 179\u2013196 (1997)","journal-title":"Designs, Codes, and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T17:42:07Z","timestamp":1552844527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}