{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:46:27Z","timestamp":1725536787747},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_13","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T07:03:43Z","timestamp":1250492623000},"page":"121-135","source":"Crossref","is-referenced-by-count":6,"title":["A Homomorphic Method for Sharing Secret Images"],"prefix":"10.1007","author":[{"given":"Naveed","family":"Islam","sequence":"first","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Brouzet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Borie, J.C., Puech, W., Dumas, M.: Encrypted Medical Images for Secure Transfer. In: ICDIA 2002, Diagnostic Imaging and Analysis, Shanghai, R.P. China, August 2002, pp. 250\u2013255 (2002)"},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2007\/13801","volume":"2007","author":"C. Fontaine","year":"2007","unstructured":"Fontaine, C., Galand, F.: A Survey of Homomorphic Encryption for Nonspecialists. EURASIP Journal Information Security\u00a02007(1), 1\u201315 (2007)","journal-title":"EURASIP Journal Information Security"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Gamal, E.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete logarithms. IEEE Transactions on Information Theory, 469\u2013472 (1985)","DOI":"10.1109\/TIT.1985.1057074"},{"issue":"12","key":"13_CR4","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/TIP.2005.859383","volume":"14","author":"M. Kuribayashi","year":"2005","unstructured":"Kuribayashi, M., Tanaka, H.: Fingerprinting Protocol for Images Based on Additive Homomorphic Property. IEEE Transactions on Image Processing\u00a014(12), 2129\u20132139 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"issue":"2","key":"13_CR6","first-page":"132","volume":"1","author":"S.R.M. Prasanna","year":"2006","unstructured":"Prasanna, S.R.M., Rao, Y.V.S., Mitra, A.: An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images. International Journal of Computer Vision\u00a01(2), 132\u2013137 (2006)","journal-title":"International Journal of Computer Vision"},{"key":"13_CR7","unstructured":"Puech, W., Rodrigues, J.M.: A New Crypto-Watermarking Method for Medical Images Safe Transfer. In: Proc. 12 th European Signal Processing Conference (EUSIPCO 2004), Vienna, Austria, pp. 1481\u20131484 (2004)"},{"key":"13_CR8","unstructured":"Rappe, D.K.: Homomorphic Cryptosystems and their Applications. Cryptology ePrint Archive, Report 2006\/001 (2006)"},{"key":"13_CR9","volume-title":"Applied cryptography","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied cryptography. Wiley, New-York (1995)"},{"key":"13_CR10","volume-title":"Image and Video Encryption: From Digital Rights Management to Secured Personal Communication","author":"A. Uhl","year":"2005","unstructured":"Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:38:22Z","timestamp":1558474702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}