{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:43Z","timestamp":1725557923103},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142970"},{"type":"electronic","value":"9783642142987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14298-7_6","type":"book-chapter","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T01:38:55Z","timestamp":1277429935000},"page":"106-128","source":"Crossref","is-referenced-by-count":2,"title":["Secure Masks for Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Weir","sequence":"first","affiliation":[]},{"given":"WeiQi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1994","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1994)"},{"key":"6_CR2","volume-title":"The Codebreakers: The Story of Secret Writing","author":"D. Khan","year":"1967","unstructured":"Khan, D.: The Codebreakers: The Story of Secret Writing. Macmillan Publishing Co., New York (1967)"},{"key":"6_CR3","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1995)"},{"key":"6_CR4","unstructured":"Kang, H.R.: Digital Color Halftoning. In: Society of Photo-Optical Instrumentation Engineers (SPIE), Bellingham, WA, USA (1999)"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C.: Visual cryptography for color images. Pattern Recognition\u00a036, 1619\u20131629 (2003)","journal-title":"Pattern Recognition"},{"issue":"8","key":"6_CR6","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Transactions on Image Processing\u00a015(8), 2441\u20132453 (2006)","journal-title":"IEEE Transactions on Image Processing"},{"key":"6_CR7","first-page":"1","volume":"250","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended Schemes for Visual Cryptography. Theoretical Computer Science\u00a0250, 1\u201316 (1996)","journal-title":"Theoretical Computer Science"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Myodo, E., Sakazawa, S., Takishima, Y.: Visual cryptography based on void-and-cluster halftoning technique. In: ICIP, pp. 97\u2013100 (2006)","DOI":"10.1109\/ICIP.2006.312371"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: ICME, pp. 2114\u20132117 (2007)","DOI":"10.1109\/ICME.2007.4285100"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, pp. 109\u2013112 (2006)","DOI":"10.1109\/ICIP.2006.312384"},{"issue":"1-2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theoretical Computer Science\u00a0250(1-2), 143\u2013161 (2001)","journal-title":"Theoretical Computer Science"},{"key":"6_CR12","volume-title":"Modern Digital Halftoning","author":"D.L. Lau","year":"2000","unstructured":"Lau, D.L., Arce, G.R.: Modern Digital Halftoning. Marcel Dekker, New York (2000)"},{"key":"6_CR13","unstructured":"Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG, pp. 303\u2013310 (2002)"},{"issue":"4","key":"6_CR14","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/S0097-8493(98)00043-0","volume":"22","author":"Y. Zhang","year":"1998","unstructured":"Zhang, Y.: Space-filling curve ordered dither. Computers & Graphics\u00a022(4), 559\u2013563 (1998)","journal-title":"Computers & Graphics"},{"issue":"1-3","key":"6_CR15","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/S0167-8655(02)00259-3","volume":"24","author":"C.C. Lin","year":"2003","unstructured":"Lin, C.C., Tsai, W.H.: Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters\u00a024(1-3), 349\u2013358 (2003)","journal-title":"Pattern Recognition Letters"},{"issue":"6","key":"6_CR16","first-page":"1262","volume":"E81-A","author":"H. Koga","year":"1998","unstructured":"Koga, H., Yamamoto, H.: Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Grey-Scale Images. IEICE Transation Fundamentals\u00a0E81-A(6), 1262\u20131269 (1998)","journal-title":"IEICE Transation Fundamentals"},{"key":"6_CR17","unstructured":"Hou, Y.C., Chang, C.Y., Tu, S.F.: Visual cryptography for color images based on halftone technology. Image, Acoustic, Speech and Signal Processing, Part 2 (2001)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/ICCIMA.2007.217","volume-title":"Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007","author":"N.K. Prakash","year":"2007","unstructured":"Prakash, N.K., Govindaraju, S.: Visual secret sharing schemes for color images using halftoning. In: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007, Washington, DC, USA, pp. 174\u2013178. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"11","key":"6_CR19","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1016\/j.ins.2007.12.016","volume":"178","author":"C.C. Chang","year":"2008","unstructured":"Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H.: A novel secret image sharing scheme in color images using small shadow images. Information Sciences\u00a0178(11), 2433\u20132447 (2008)","journal-title":"Information Sciences"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11424758_3","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005, Part I. LNCS, vol.\u00a03480, pp. 19\u201328. Springer, Heidelberg (2005)"},{"key":"6_CR21","unstructured":"Wu, C., Chen, L.: A study on visual cryptography. Master\u2019s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. (1998)"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.csi.2004.12.006","volume":"28","author":"H.C. Wu","year":"2005","unstructured":"Wu, H.C., Chang, C.C.: Sharing visual multi-secrets using circle shares. Computer Standards & Interfaces\u00a028, 123\u2013135 (2005)","journal-title":"Computer Standards & Interfaces"},{"key":"6_CR23","first-page":"996","volume":"2","author":"H.C. Hsu","year":"2004","unstructured":"Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control\u00a02, 996\u20131001 (2004)","journal-title":"Networking, Sensing and Control"},{"issue":"12","key":"6_CR24","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"S.J. Shyu","year":"2007","unstructured":"Shyu, S.J., Huang, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognition\u00a040(12), 3633\u20133651 (2007)","journal-title":"Pattern Recognition"},{"issue":"5","key":"6_CR25","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"S.J. Shyu","year":"2006","unstructured":"Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recognition\u00a039(5), 866\u2013880 (2006)","journal-title":"Pattern Recognition"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Chuang, S.C., Huang, C.H., Wu, J.L.: Unseen visible watermarking. In: Proceedings of International Conference on Image Processing, San Antonio, USA, pp. 261\u2013264 (2007)","DOI":"10.1109\/ICIP.2007.4379296"},{"key":"6_CR27","first-page":"239","volume-title":"ACM SIGGRAPH","author":"R.D. Hersch","year":"2004","unstructured":"Hersch, R.D., Chosson, S.: Band moir\u00e9 images. In: ACM SIGGRAPH, pp. 239\u2013247. ACM, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14298-7_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:50:45Z","timestamp":1606168245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14298-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642142970","9783642142987"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14298-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}