{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:46:29Z","timestamp":1725536789042},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036873"},{"type":"electronic","value":"9783642036880"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03688-0_14","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T07:03:43Z","timestamp":1250492623000},"page":"136-148","source":"Crossref","is-referenced-by-count":6,"title":["Dot-Size Variant Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Weir","sequence":"first","affiliation":[]},{"given":"Wei-Qi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"14_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/278476.278485","volume":"41","author":"N. Memon","year":"1998","unstructured":"Memon, N., Wong, P.W.: Protecting digital media content. Communications of the ACM\u00a041(7), 35\u201343 (1998)","journal-title":"Communications of the ACM"},{"issue":"12","key":"14_CR2","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1016\/j.patrec.2004.05.006","volume":"25","author":"C.C. Chang","year":"2004","unstructured":"Chang, C.C., Tseng, H.W.: A steganographic method for digital images using side match. Pattern Recognition Letters\u00a025(12), 1431\u20131437 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"9","key":"14_CR3","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1016\/j.patcog.2008.03.005","volume":"41","author":"C.L. Liu","year":"2008","unstructured":"Liu, C.L., Liao, S.R.: High-performance jpeg steganography using complementary embedding strategy. Pattern Recognition\u00a041(9), 2945\u20132955 (2008)","journal-title":"Pattern Recognition"},{"key":"14_CR4","unstructured":"Fu, M.S., Au, O.: Joint visual cryptography and watermarking. In: ICME 2004, vol.\u00a02, pp. 975\u2013978 (2004)"},{"key":"14_CR5","unstructured":"Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. In: Proceedings of World Academy of Science, Engineering and Technology, vol.\u00a08, pp. 159\u2013162 (2005)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Wu, C.W., Thompson, G.R., Stanich, M.J.: Digital watermarking and steganography via overlays of halftone images, vol.\u00a05561, pp. 152\u2013163. SPIE (2004)","DOI":"10.1117\/12.562175"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"14_CR8","first-page":"1","volume":"250","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended schemes for visual cryptography. Theoretical Computer Science\u00a0250, 1\u201316 (1996)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129(2), 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1007\/11559573_143","volume-title":"Image Analysis and Recognition","author":"C.-N. Yang","year":"2005","unstructured":"Yang, C.-N., Chen, T.-S.: Extended visual secret sharing schemes with high-quality shadow images using gray sub pixels. In: Kamel, M.S., Campilho, A.C. (eds.) ICIAR 2005. LNCS, vol.\u00a03656, pp. 1184\u20131191. Springer, Heidelberg (2005)"},{"issue":"10","key":"14_CR11","first-page":"2172","volume":"E82-A","author":"R. Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions\u00a0E82-A(10), 2172\u20132177 (1999)","journal-title":"IEICE Transactions"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters\u00a025(4), 481\u2013494 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters\u00a026(2), 193\u2013206 (2005)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1093\/ietfec\/e89-a.2.620","volume":"89-A","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Transactions\u00a089-A(2), 620\u2013625 (2006)","journal-title":"IEICE Transactions"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/11867586_44","volume-title":"Image Analysis and Recognition","author":"C.-N. Yang","year":"2006","unstructured":"Yang, C.-N., Chen, T.-S.: Visual secret sharing scheme: Improving the contrast of a recovered image via different pixel expansions. In: Campilho, A., Kamel, M.S. (eds.) ICIAR 2006. LNCS, vol.\u00a04141, pp. 468\u2013479. Springer, Heidelberg (2006)"},{"issue":"2","key":"14_CR16","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science\u00a0240(2), 471\u2013485 (2000)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"14_CR17","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C. Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., Santis, A.D., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics\u00a016(2), 224\u2013261 (2003)","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/11767480_30","volume-title":"Applied Cryptography and Network Security","author":"C.-N. Yang","year":"2006","unstructured":"Yang, C.-N., Wang, C.-C., Chen, T.-S.: Real perfect contrast visual secret sharing schemes with reversing. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 433\u2013447. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03688-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:38:14Z","timestamp":1558474694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03688-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036873","9783642036880"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03688-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}