{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:25:32Z","timestamp":1761708332906},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007293"},{"type":"electronic","value":"9783642007309"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00730-9_6","type":"book-chapter","created":{"date-parts":[[2009,3,17]],"date-time":"2009-03-17T11:22:23Z","timestamp":1237288943000},"page":"84-97","source":"Crossref","is-referenced-by-count":2,"title":["Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images"],"prefix":"10.1007","author":[{"given":"Miyuki","family":"Uno","sequence":"first","affiliation":[]},{"given":"Mikio","family":"Kano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography\u00a024, 255\u2013278 (2001)","journal-title":"Designs, Codes and Cryptography"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the Contrast in Visual Cryptography Schemes. J. Cryptology\u00a012, 261\u2013289 (1999)","journal-title":"J. Cryptology"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/S0097-8493(98)00034-X","volume":"22","author":"C. Blundo","year":"1998","unstructured":"Blundo, C., De Santis, A.: Visual cryptography schemes with perfect reconstruction of black pixels. Computer and Graphics\u00a022(4), 449\u2013455 (1998)","journal-title":"Computer and Graphics"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"S. Droste","year":"1996","unstructured":"Droste, S.: New results on visual cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 401\u2013415. Springer, Heidelberg (1996)"},{"issue":"10","key":"6_CR6","first-page":"2577","volume":"E86-A","author":"M. Iwamoto","year":"2003","unstructured":"Iwamoto, M., Yamamoto, H.: A construction method of visual secret sharing schemes for plural secret image. IEICE Trans. Fundamentals\u00a0E86-A(10), 2577\u20132588 (2003)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10623-005-6700-y","volume":"40","author":"H. Koga","year":"2006","unstructured":"Koga, H., Ueda, E.: The optimal (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Designs, Codes and Cryptography\u00a040(1), 81\u2013102 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-36178-2_21","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"H. Koga","year":"2002","unstructured":"Koga, H.: A general formula of the (t,n)-threshold visual secret sharing scheme. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 328\u2013345. Springer, Heidelberg (2002)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-72163-5_26","volume-title":"Information Security Practice and Experience","author":"M. Uno","year":"2007","unstructured":"Uno, M., Kano, M.: Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol.\u00a04464, pp. 344\u2013359. Springer, Heidelberg (2007)"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1080\/10020070612330015","volume":"16","author":"F. Yi","year":"2006","unstructured":"Yi, F., Wang, D., Luo, P., Huang, L., Dai, Y.: Multi secret image color visual cryptography schemes for general access structures. Progr. Natur. Sci. (English Ed.)\u00a016(4), 431\u2013436 (2006)","journal-title":"Progr. Natur. Sci. (English Ed.)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00730-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T03:11:59Z","timestamp":1551928319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00730-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007293","9783642007309"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00730-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}