{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T15:54:56Z","timestamp":1770134096865,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":101,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642142970","type":"print"},{"value":"9783642142987","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14298-7_5","type":"book-chapter","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T05:38:55Z","timestamp":1277444335000},"page":"70-105","source":"Crossref","is-referenced-by-count":97,"title":["A Comprehensive Study of Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Weir","sequence":"first","affiliation":[]},{"given":"WeiQi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"5_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1994","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1994)"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C. Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics\u00a016(2), 224\u2013261 (2003)","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"5_CR4","volume-title":"Modern Digital Halftoning","author":"D.L. Lau","year":"2000","unstructured":"Lau, D.L., Arce, G.R.: Modern Digital Halftoning. Marcel Dekker, New York (2000)"},{"key":"5_CR5","first-page":"1","volume":"250","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theoretical Computer Science\u00a0250, 1\u201316 (1996)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129(2), 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1007\/11559573_143","volume-title":"Image Analysis and Recognition","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes with high-quality shadow images using gray sub pixels. In: Kamel, M.S., Campilho, A.C. (eds.) ICIAR 2005. LNCS, vol.\u00a03656, pp. 1184\u20131191. Springer, Heidelberg (2005)"},{"issue":"10","key":"5_CR8","first-page":"2172","volume":"E82-A","author":"R. Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions\u00a0E82-A(10), 2172\u20132177 (1999)","journal-title":"IEICE Transactions"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1019939020426","volume":"27","author":"W.G. Tzeng","year":"2002","unstructured":"Tzeng, W.G., Hu, C.M.: A new approach for visual cryptography. Designs, Codes and Cryptography\u00a027(3), 207\u2013227 (2002)","journal-title":"Designs, Codes and Cryptography"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters\u00a025(4), 481\u2013494 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"5_CR11","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1093\/ietfec\/e89-a.2.620","volume":"89-A","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Transactions\u00a089-A(2), 620\u2013625 (2006)","journal-title":"IEICE Transactions"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/11867586_44","volume-title":"Image Analysis and Recognition","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: Visual secret sharing scheme: Improving the contrast of a recovered image via different pixel expansions. In: Campilho, A., Kamel, M.S. (eds.) ICIAR 2006. LNCS, vol.\u00a04141, pp. 468\u2013479. Springer, Heidelberg (2006)"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters\u00a026(2), 193\u2013206 (2005)","journal-title":"Pattern Recognition Letters"},{"issue":"9","key":"5_CR14","doi-asserted-by":"crossref","first-page":"2471","DOI":"10.1093\/ietfec\/e88-a.9.2471","volume":"88-A","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Size-adjustable visual secret sharing schemes. IEICE Transactions\u00a088-A(9), 2471\u20132474 (2005)","journal-title":"IEICE Transactions"},{"issue":"7","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.patcog.2006.01.013","volume":"39","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition\u00a039(7), 1300\u20131314 (2006)","journal-title":"Pattern Recognition"},{"issue":"6","key":"5_CR16","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TCSVT.2003.813431","volume":"13","author":"C.H. Kim","year":"2003","unstructured":"Kim, C.H., Seong, S.M., Lee, J.A., Kim, L.S.: Winscale: an image-scaling algorithm using an area pixel model. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(6), 549\u2013553 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"5_CR17","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2001","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley Longman Publishing Co., Inc., Boston (2001)"},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science\u00a0240(2), 471\u2013485 (2000)","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"37","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., Hollmann, H.D.L., van Lint, J.H., Tolhuizen, L.M.G.M.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography\u00a037(1), 169\u2013186 (2005)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Yang, C.N., Chen, T.S.: An image secret sharing scheme with the capability of previvewing the secret image. In: ICME 2007, pp. 1535\u20131538 (2007)","DOI":"10.1109\/ICME.2007.4284955"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C.C. Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: Secret image sharing. Computers & Graphics\u00a026, 765\u2013770 (2002)","journal-title":"Computers & Graphics"},{"issue":"6","key":"5_CR22","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"R.Z. Wang","year":"2006","unstructured":"Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recognition Letters\u00a027(6), 551\u2013555 (2006)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"5_CR23","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G. Horng","year":"2006","unstructured":"Horng, G., Chen, T., Tsai, D.S.: Cheating in visual cryptography. Des. Codes Cryptography\u00a038(2), 219\u2013236 (2006)","journal-title":"Des. Codes Cryptography"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M. Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 322\u2013336. Springer, Heidelberg (1997)"},{"key":"5_CR25","unstructured":"Yang, C., Laih, C.: Some new types of visual secret sharing schemes, vol.\u00a0III, pp. 260\u2013268 (December 1999)"},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"C.M. Hu","year":"2007","unstructured":"Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Transactions on Image Processing\u00a016(1), 36\u201345 (2007)","journal-title":"IEEE Transactions on Image Processing"},{"key":"5_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/BFb0028462","volume-title":"Information and Communications Security","author":"I. Biehl","year":"1997","unstructured":"Biehl, I., Wetzel, S.: Traceable visual cryptography. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 61\u201371. Springer, Heidelberg (1997)"},{"key":"5_CR28","unstructured":"Kang, H.R.: Digital Color Halftoning. In: Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, WA, USA (1999)"},{"key":"5_CR29","volume-title":"The Designer\u2019s Lexicon","author":"A. Campbell","year":"2000","unstructured":"Campbell, A.: The Designer\u2019s Lexicon. Chronicle Books, San Francisco (2000)"},{"issue":"8","key":"5_CR30","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Transactions on Image Processing\u00a015(8), 2441\u20132453 (2006)","journal-title":"IEEE Transactions on Image Processing"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Myodo, E., Sakazawa, S., Takishima, Y.: Visual cryptography based on void-and-cluster halftoning technique. In: ICIP, pp. 97\u2013100 (2006)","DOI":"10.1109\/ICIP.2006.312371"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: ICME, pp. 2114\u20132117 (2007)","DOI":"10.1109\/ICME.2007.4285100"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, pp. 109\u2013112 (2006)","DOI":"10.1109\/ICIP.2006.312384"},{"issue":"1-2","key":"5_CR34","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoretical Computer Science\u00a0250(1-2), 143\u2013161 (2001)","journal-title":"Theoretical Computer Science"},{"key":"5_CR35","unstructured":"Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG, pp. 303\u2013310 (2002)"},{"issue":"4","key":"5_CR36","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/S0097-8493(98)00043-0","volume":"22","author":"Y. Zhang","year":"1998","unstructured":"Zhang, Y.: Space-filling curve ordered dither. Computers & Graphics\u00a022(4), 559\u2013563 (1998)","journal-title":"Computers & Graphics"},{"issue":"1-3","key":"5_CR37","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0167-8655(02)00259-3","volume":"24","author":"C.C. Lin","year":"2003","unstructured":"Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters\u00a024(1-3), 349\u2013358 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"5_CR38","first-page":"609","volume-title":"ICME 2003","author":"M.S. Fu","year":"2003","unstructured":"Fu, M.S., Au, O.C.: A novel method to embed watermark in different halftone images: data hiding by conjugate error diffusion (dhced). In: ICME 2003, Washington, DC, USA, pp. 609\u2013612. IEEE Computer Society, Los Alamitos (2003)"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Wu, C.W., Thompson, G.R., Stanich, M.J.: Digital watermarking and steganography via overlays of halftone images. In: SPIE, vol.\u00a05561, pp. 152\u2013163 (2004)","DOI":"10.1117\/12.562175"},{"key":"5_CR40","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2421.001.0001","volume-title":"Digital Halftoning","author":"R.A. Ulichney","year":"1987","unstructured":"Ulichney, R.A.: Digital Halftoning. MIT Press, Cambridge (1987)"},{"issue":"21","key":"5_CR41","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","volume":"177","author":"Y.F. Chen","year":"2007","unstructured":"Chen, Y.F., Chan, Y.K., Huang, C.C., Tsai, M.H., Chu, Y.P.: A multiple-level visual secret-sharing scheme without image size expansion. Information Sciences\u00a0177(21), 4696\u20134710 (2007)","journal-title":"Information Sciences"},{"issue":"10","key":"5_CR42","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D. Wang","year":"2007","unstructured":"Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognition\u00a040(10), 2776\u20132785 (2007)","journal-title":"Pattern Recognition"},{"issue":"4","key":"5_CR43","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ipl.2004.10.011","volume":"93","author":"S. Cimato","year":"2005","unstructured":"Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Information Processing Letters\u00a093(4), 199\u2013206 (2005)","journal-title":"Information Processing Letters"},{"key":"5_CR44","series-title":"Lecture Notes in Computer Science","first-page":"353","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"Q.V. Duong","year":"2004","unstructured":"Duong, Q.V., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 353\u2013365. Springer, Heidelberg (2004)"},{"key":"5_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/11767480_30","volume-title":"Applied Cryptography and Network Security","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Wang, C.C., Chen, T.S.: Real perfect contrast visual secret sharing schemes with reversing. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 433\u2013447. Springer, Heidelberg (2006)"},{"key":"5_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/3-540-62494-5_18","volume-title":"Security Protocols","author":"M. Naor","year":"1997","unstructured":"Naor, M., Shamir, A.: Visual cryptography ii: Improving the contrast via the cover base. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 197\u2013202. Springer, Heidelberg (1997)"},{"key":"5_CR47","unstructured":"Rijmen, V., Preneel, B.: Efficient color visual encryption for shared colors of benetton. In: EUCRYPTO 1996 (1996)"},{"issue":"2","key":"5_CR48","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., Tilborg, H.C.A.V.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptography\u00a011(2), 179\u2013196 (1997)","journal-title":"Des. Codes Cryptography"},{"issue":"3","key":"5_CR49","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C.N. Yang","year":"2000","unstructured":"Yang, C.N., Laih, C.S.: New colored visual secret sharing schemes. Designs, Codes and Cryptography\u00a020(3), 325\u2013336 (2000)","journal-title":"Designs, Codes and Cryptography"},{"issue":"3","key":"5_CR50","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S. Cimato","year":"2005","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Optimal colored threshold visual cryptography schemes. Designs, Codes and Cryptography\u00a035(3), 311\u2013335 (2005)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR51","unstructured":"Hou, Y.C., Chang, C.Y., Tu, S.F.: Visual cryptography for color images based on halftone technology. Image, Acoustic, Speech and Signal Processing, Part 2 (2001)"},{"key":"5_CR52","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C.: Visual cryptography for color images. Pattern Recognition\u00a036, 1619\u20131629 (2003)","journal-title":"Pattern Recognition"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Leung, B.W., Ng, F.Y., Wong, D.S.: On the security of a visual cryptography scheme for color images. Pattern Recognition (August 2008)","DOI":"10.1016\/j.patcog.2008.08.031"},{"issue":"6","key":"5_CR54","first-page":"1262","volume":"E81-A","author":"H. Koga","year":"1998","unstructured":"Koga, H., Yamamoto, H.: Proposal of a lattice-based visual secret sharing scheme for color and grey-scale images. IEICE Transactions Fundamentals\u00a0E81-A(6), 1262\u20131269 (1998)","journal-title":"IEICE Transactions Fundamentals"},{"key":"5_CR55","first-page":"174","volume":"3","author":"N. Krishna Prakash","year":"2007","unstructured":"Krishna Prakash, N., Govindaraju, S.: Visual secret sharing schemes for color images using halftoning. Proceedings of Computational Intelligence and Multimedia Applications\u00a03, 174\u2013178 (2007)","journal-title":"Proceedings of Computational Intelligence and Multimedia Applications"},{"issue":"5","key":"5_CR56","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.patcog.2004.11.010","volume":"38","author":"R. Lukac","year":"2005","unstructured":"Lukac, R., Plataniotis, K.N.: Bit-level based secret sharing for image encryption. Pattern Recognition\u00a038(5), 767\u2013772 (2005)","journal-title":"Pattern Recognition"},{"issue":"5","key":"5_CR57","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"S.J. Shyu","year":"2006","unstructured":"Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition\u00a039(5), 866\u2013880 (2006)","journal-title":"Pattern Recognition"},{"issue":"3","key":"5_CR58","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography\u00a024(3), 255\u2013278 (2001)","journal-title":"Designs, Codes and Cryptography"},{"issue":"11","key":"5_CR59","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1016\/j.ins.2007.12.016","volume":"178","author":"C.C. Chang","year":"2008","unstructured":"Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H.: A novel secret image sharing scheme in color images using small shadow images. Information Sciences\u00a0178(11), 2433\u20132447 (2008)","journal-title":"Information Sciences"},{"key":"5_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11424758_3","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03480, pp. 19\u201328. Springer, Heidelberg (2005)"},{"issue":"10","key":"5_CR61","doi-asserted-by":"publisher","first-page":"3114","DOI":"10.1016\/j.patcog.2008.03.031","volume":"41","author":"C.N. Yang","year":"2008","unstructured":"Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognition\u00a041(10), 3114\u20133129 (2008)","journal-title":"Pattern Recognition"},{"issue":"1-3","key":"5_CR62","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S. Cimato","year":"2007","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoretical Computer Science\u00a0374(1-3), 261\u2013276 (2007)","journal-title":"Theoretical Computer Science"},{"key":"5_CR63","doi-asserted-by":"crossref","unstructured":"Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. SPIE Journal of Electronic Imaging\u00a014(3) (2005)","DOI":"10.1117\/1.1993625"},{"issue":"4","key":"5_CR64","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1016\/j.patcog.2007.09.004","volume":"41","author":"W.P. Fang","year":"2008","unstructured":"Fang, W.P.: Friendly progressive visual secret sharing. Pattern Recognition\u00a041(4), 1410\u20131414 (2008)","journal-title":"Pattern Recognition"},{"issue":"12","key":"5_CR65","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1016\/j.patcog.2005.04.002","volume":"38","author":"S.K. Chen","year":"2005","unstructured":"Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognition\u00a038(12), 2466\u20132471 (2005)","journal-title":"Pattern Recognition"},{"issue":"2","key":"5_CR66","doi-asserted-by":"publisher","first-page":"23020","DOI":"10.1117\/1.2193912","volume":"15","author":"W.P. Fang","year":"2006","unstructured":"Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. Journal of Electronic Imaging\u00a015(2), 023020 (2006)","journal-title":"Journal of Electronic Imaging"},{"issue":"12","key":"5_CR67","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"C.C. Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(12), 1161\u20131169 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"5_CR68","unstructured":"Wu, C., Chen, L.: A study on visual cryptography. Master\u2019s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)"},{"issue":"8","key":"5_CR69","first-page":"1344","volume":"J79-A","author":"T. Katoh","year":"1996","unstructured":"Katoh, T., Imai, H.: An extended construction method for visual secret sharing schemes. IEICE Transactions\u00a0J79-A(8), 1344\u20131351 (1996)","journal-title":"IEICE Transactions"},{"issue":"5","key":"5_CR70","first-page":"879","volume":"21","author":"C.N. Yang","year":"2007","unstructured":"Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: Improving the shadow image quality. IJPRAI\u00a021(5), 879\u2013898 (2007)","journal-title":"IJPRAI"},{"key":"5_CR71","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.csi.2004.12.006","volume":"28","author":"H.C. Wu","year":"2005","unstructured":"Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces\u00a028, 123\u2013135 (2005)","journal-title":"Computer Standards & Interfaces"},{"key":"5_CR72","first-page":"996","volume":"2","author":"H.C. Hsu","year":"2004","unstructured":"Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control\u00a02, 996\u20131001 (2004)","journal-title":"Networking, Sensing and Control"},{"issue":"12","key":"5_CR73","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"S.J. Shyu","year":"2007","unstructured":"Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition\u00a040(12), 3633\u20133651 (2007)","journal-title":"Pattern Recognition"},{"key":"5_CR74","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.Q.: Sharing multiple secrets using visual cryptography. In: IEEE ISCAS 2009, Taiwan (2009)","DOI":"10.1109\/ISCAS.2009.5117797"},{"issue":"12","key":"5_CR75","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1016\/j.patcog.2008.05.031","volume":"41","author":"J.B. Feng","year":"2008","unstructured":"Feng, J.B., Wu, H.C., Tsai, C.S., Chang, Y.F., Chu, Y.P.: Visual secret sharing for multiple secrets. Pattern Recognition\u00a041(12), 3572\u20133581 (2008)","journal-title":"Pattern Recognition"},{"key":"5_CR76","unstructured":"Chen, S.K.: A visual cryptography based system for sharing multiple secret images. In: ISCGAV 2007: Proceedings of the 7th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision, Stevens Point, Wisconsin, USA, World Scientific and Engineering Academy and Society (WSEAS), pp. 117\u2013122 (2007)"},{"issue":"1","key":"5_CR77","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/0161-110291890768","volume":"26","author":"M. Gnanaguruparan","year":"2002","unstructured":"Gnanaguruparan, M., Kak, S.: Recursive hiding of secrets in visual cryptography. Cryptologia\u00a026(1), 68\u201376 (2002)","journal-title":"Cryptologia"},{"issue":"1-3","key":"5_CR78","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0304-3975(02)00399-7","volume":"295","author":"G.D. Crescenzo","year":"2003","unstructured":"Crescenzo, G.D.: Sharing one secret vs. sharing many secrets. Theoretical Computer Science\u00a0295(1-3), 123\u2013140 (2003)","journal-title":"Theoretical Computer Science"},{"key":"5_CR79","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W., Crookes, D.: Secure mask for color image hidding. In: Communications and Networking in China, ChinaCom 2008, August 2008, pp. 1304\u20131307 (2008)","DOI":"10.1109\/CHINACOM.2008.4685266"},{"issue":"7","key":"5_CR80","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/278476.278485","volume":"41","author":"N. Memon","year":"1998","unstructured":"Memon, N., Wong, P.W.: Protecting digital media content. Communications of the ACM\u00a041(7), 35\u201343 (1998)","journal-title":"Communications of the ACM"},{"key":"5_CR81","doi-asserted-by":"crossref","unstructured":"van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: ICIP(2), pp. 86\u201390 (1994)","DOI":"10.1109\/ICIP.1994.413536"},{"key":"5_CR82","doi-asserted-by":"crossref","unstructured":"Braudaway, G.W., Magerlein, K.A., Mintzer, F.: Protecting publicly available images with a visible image watermark. In: van Renesse, R.L. (ed.) Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, March 1996. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol.\u00a02659, pp. 126\u2013133 (1996)","DOI":"10.1117\/12.235469"},{"key":"5_CR83","unstructured":"Wong, P.W.: A watermark for image integrity and ownership verification. In: PICS, IS&T - The Society for Imaging Science and Technology, pp. 374\u2013379 (1998)"},{"key":"5_CR84","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/IIHMSP.2007.4457550","volume":"1","author":"H. Luo","year":"2007","unstructured":"Luo, H., Pan, J.S., Lu, Z.M.: Hiding multiple watermarks in transparencies of visual cryptography. Intelligent Information Hiding and Multimedia Signal Processing\u00a01, 303\u2013306 (2007)","journal-title":"Intelligent Information Hiding and Multimedia Signal Processing"},{"issue":"2","key":"5_CR85","first-page":"97","volume":"3","author":"R.J. Hwang","year":"2000","unstructured":"Hwang, R.J.: A digital image copyright protection scheme based on visual cryptography. Tamkang Journal of Science and Engineering\u00a03(2), 97\u2013106 (2000)","journal-title":"Tamkang Journal of Science and Engineering"},{"key":"5_CR86","first-page":"159","volume":"8","author":"M.A. Hassan","year":"2005","unstructured":"Hassan, M.A., Khalili, M.A.: Self watermarking based on visual cryptography. Proceedings of World Academy of Science, Engineering and Technology\u00a08, 159\u2013162 (2005)","journal-title":"Proceedings of World Academy of Science, Engineering and Technology"},{"key":"5_CR87","unstructured":"Sleit, A., Abusitta, A.: A visual cryptography based watermark technology for individual and group images. Systemics, Cybernetics And Informatics\u00a05(2), 24\u201332"},{"key":"5_CR88","first-page":"261","volume-title":"ICIP(3)","author":"S.C. Chuang","year":"2007","unstructured":"Chuang, S.C., Huang, C.H., Wu, J.L.: Unseen visible watermarking. In: ICIP(3), pp. 261\u2013264. IEEE, Los Alamitos (2007)"},{"key":"5_CR89","doi-asserted-by":"crossref","unstructured":"Hou, Y.C., Chen, P.M.: An asymmetric watermarking scheme based on visual cryptography. In: WCCC-ICSP 5th International Conference on Signal Processing Proceedings, vol.\u00a02, pp. 992\u2013995 (2000)","DOI":"10.1109\/ICOSP.2000.891692"},{"key":"5_CR90","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/1186562.1015709","volume-title":"ACM SIGGRAPH 2004","author":"R.D. Hersch","year":"2004","unstructured":"Hersch, R.D., Chosson, S.: Band moir\u00e9 images. In: ACM SIGGRAPH 2004, pp. 239\u2013247. ACM, New York (2004)"},{"key":"5_CR91","doi-asserted-by":"crossref","unstructured":"Knotts, M.E., Hemphill, R.G.: Selected papers on optical moir\u00e9 and applications. Optics & Photonics News, 53\u201355 (August 1996)","DOI":"10.1364\/OPN.7.8.000053"},{"key":"5_CR92","volume-title":"The physics of Moire metrology","author":"O. Kafri","year":"1990","unstructured":"Kafri, O., Glatt, I.: The physics of Moire metrology. Wiley, New York (1990)"},{"key":"5_CR93","unstructured":"Indebetouw, G., Czarnek, R.: Selected papers on optical moir\u00e9 and applications. SPIE Milestones Series, vol.\u00a0MS64 (1992)"},{"key":"5_CR94","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-011-4205-2","volume-title":"The Theory of the Moir\u00e9 Phenomenon","author":"I. Amidror","year":"2000","unstructured":"Amidror, I.: The Theory of the Moir\u00e9 Phenomenon. Kluwer, Dordrecht (2000)"},{"key":"5_CR95","doi-asserted-by":"crossref","unstructured":"Hutley, M., Stevens, R.: Optical inspection of arrays and periodic structures using moire magnification. In: Searching for Information: Artificial Intelligence and Information Retrieval Approaches (Ref. No. 1999\/199), IEE Two-day Seminar, pp. 8\/1\u20138\/5 (1999)","DOI":"10.1049\/ic:19990867"},{"issue":"11","key":"5_CR96","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1117\/1.601889","volume":"37","author":"H. Kamal","year":"1998","unstructured":"Kamal, H., V\u00f6lkel, R., Alda, J.: Properties of moir[e-acute] magnifiers. Optical Engineering\u00a037(11), 3007\u20133014 (1998)","journal-title":"Optical Engineering"},{"key":"5_CR97","unstructured":"Gabrielyan, E.: Shape moir\u00e9 patterns (March 2007), http:\/\/switzernet.com\/people\/emin-gabrielyan\/070320-shape-moire\/"},{"key":"5_CR98","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Le, T.V.: Moir\u00e9 cryptography. In: ACM Conference on Computer and Communications Security, pp. 116\u2013124 (2000)","DOI":"10.1145\/352600.352618"},{"issue":"22","key":"5_CR99","doi-asserted-by":"publisher","first-page":"4700","DOI":"10.1364\/AO.34.004700","volume":"34","author":"S. Liu","year":"1995","unstructured":"Liu, S., Zhang, X., Lai, H.: Artistic effect and application of moire\u00e9 patterns in security holograms. Applied Optics\u00a034(22), 4700\u20134702 (1995)","journal-title":"Applied Optics"},{"key":"5_CR100","first-page":"579","volume-title":"ACM SIGGRAPH 2001","author":"E. Praun","year":"2001","unstructured":"Praun, E., Hoppe, H., Webb, M., Finkelstein, A.: Real-time hatching. In: ACM SIGGRAPH 2001, pp. 579\u2013584. ACM, New York (2001)"},{"key":"5_CR101","unstructured":"Yan, W.Q., Jin, D., Kankanhalli, M.S.: Visual cryptography for print and scan applications. In: Proceedings of International Symposium on Circuits and Systems, Vancouver, Canada, May 2004, pp. 572\u2013575 (2004)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14298-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T06:53:18Z","timestamp":1740207198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14298-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142970","9783642142987"],"references-count":101,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14298-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}