{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:14:06Z","timestamp":1725516846709},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540794981"},{"type":"electronic","value":"9783540794998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79499-8_16","type":"book-chapter","created":{"date-parts":[[2008,8,16]],"date-time":"2008-08-16T16:35:36Z","timestamp":1218904536000},"page":"192-200","source":"Crossref","is-referenced-by-count":7,"title":["Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images"],"prefix":"10.1007","author":[{"given":"Daoshun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaobo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"16_CR2","unstructured":"Rijmen, V., Preneel, B.: Efficient Colour Visual Encryption or \u2018Shared Colors of Benetton\u2019. In: Rump Session of EUROCRYPTO 1996 (1996), \n                    \n                      http:\/\/www.iacr.org\/conferences\/ec96\/rump\/preneel.ps"},{"issue":"3","key":"16_CR3","first-page":"367","volume":"18","author":"C.N. Yang","year":"2002","unstructured":"Yang, C.N.: A Note on Efficient Color Visual Encryption. Journal of Information Science and Engineering\u00a018(3), 367\u2013372 (2002)","journal-title":"Journal of Information Science and Engineering"},{"issue":"7","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C.: Visual Cryptography for Color Images. Pattern Recognition\u00a036(7), 1619\u20131629 (2003)","journal-title":"Pattern Recognition"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., Van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes, and Cryptography\u00a011, 179\u2013196 (1997)","journal-title":"Designs, Codes, and Cryptography"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., De Bonis, A., De Santis, A.: Improved Schemes for Visual Cryptography. Designs, Codes, and Cryptography\u00a024, 255\u2013278 (2001)","journal-title":"Designs, Codes, and Cryptography"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C.N. Yang","year":"2000","unstructured":"Yang, C.N., Laih, C.S.: New Colored Visual Secret Sharing Schemes. Designs, Codes, and Cryptography\u00a020, 325\u2013335 (2000)","journal-title":"Designs, Codes, and Cryptography"},{"key":"16_CR8","first-page":"139","volume-title":"IEEE Information Theory Workshop","author":"S. Cimato","year":"2003","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Contrast Optimal Colored Visual Cryptography Schemes. In: IEEE Information Theory Workshop, pp. 139\u2013142. IEEE Press, New York (2003)"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/S0020-0190(00)00108-3","volume":"75","author":"C. Blundo","year":"2000","unstructured":"Blundo, C., De Santis, A., Naor, M.: Visual Cryptography for Grey Level images. Information Processing Letters\u00a075, 255\u2013259 (2000)","journal-title":"Information Processing Letters"},{"issue":"10","key":"16_CR10","first-page":"2238","volume":"E85-A","author":"M. Iwamoto","year":"2002","unstructured":"Iwamoto, M., Yamamoto, H.: The Optimal n -out of- n Visual Secret Sharing Scheme for Gray-scale Images. IEICE Transactions on Fundamentals of Electronics\u00a0E85-A (10), 2238\u20132247 (2002)","journal-title":"IEICE Transactions on Fundamentals of Electronics"},{"issue":"10","key":"16_CR11","first-page":"2172","volume":"E82-A","author":"R. Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image Size Invariant Visual Cryptography. IEICE Transactions on Fundamentals of Electronics\u00a0E82-A (10), 2172\u20132177 (1999)","journal-title":"IEICE Transactions on Fundamentals of Electronics"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters\u00a025, 481\u2013494 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S. Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic Visual Cryptography Schemes. Computer Journal\u00a049(1), 97\u2013107 (2006)","journal-title":"Computer Journal"},{"key":"16_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/11875604_8","volume-title":"Foundations of Intelligent Systems","author":"C.S. Hsu","year":"2006","unstructured":"Hsu, C.S., Tu, S.F., Hou, Y.C.: An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares. In: Esposito, F., Ra\u015b, Z.W., Malerba, D., Semeraro, G. (eds.) ISMIS 2006. LNCS (LNAI), vol.\u00a04203, pp. 58\u201367. Springer, Heidelberg (2006)"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D.S. Wang","year":"2007","unstructured":"Wang, D.S., Zhang, L., Ma, N., Li, X.: Two Secret Sharing Schemes Based on Boolean Operations. Pattern Recognition\u00a040, 2776\u20132785 (2007)","journal-title":"Pattern Recognition"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79499-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:23:48Z","timestamp":1619522628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79499-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540794981","9783540794998"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79499-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}