{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T17:24:55Z","timestamp":1758475495958},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_113","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T16:41:05Z","timestamp":1283445665000},"page":"647-650","source":"Crossref","is-referenced-by-count":1,"title":["Secret Sharing Scheme for Image Encryption Using new Transformation Matrix"],"prefix":"10.1007","author":[{"given":"A.","family":"Kalai Selvi","sequence":"first","affiliation":[]},{"given":"M.","family":"Mohamed Sathik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"113_CR1","unstructured":"Runhua, S., Hong, Z., Liusheng, H., Yonglong, L.: A (t,n) Secret Sharing Scheme for Image encryption. In: 2008 Congress on Image and Signal Processing Proceeding of IEEE (2008)"},{"key":"113_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communication. ACM\u00a022, 612\u2013613 (1979)","journal-title":"ACM"},{"key":"113_CR3","series-title":"Lecture Notes in Computer Science","first-page":"441","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1994","unstructured":"Naor, M.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 441\u2013449. Springer, Heidelberg (1994)"},{"key":"113_CR4","doi-asserted-by":"crossref","unstructured":"Zhenfu, C.: A threshold key escrow based on public key cryptosystem. In: Science in China (Series E ), pp. 441\u2013448 (2001)","DOI":"10.1007\/BF02916697"},{"key":"113_CR5","unstructured":"Lerma, M.A.: Modular Arithmetic (2005), http:\/\/www.math.northwestern.edu\/~mlerma\/problem_solving\/results\/modular_arith.pdf"},{"key":"113_CR6","unstructured":"Lukac, R., Plataniotis, K.N.: A Secret Sharing Scheme for Image Encryption. In: 46th International Symposium Electronics in Marine, EIMAR 2004, pp. 549\u2013554 (2004)"},{"key":"113_CR7","doi-asserted-by":"crossref","unstructured":"Wang, L., Ye, Q., Xiao, Y., Zou, Y., Zhang, B.: An Image Encryption Scheme Based on Cross Chaotic Map. In: Proc. IEEE 2008 Congress on Image and Signal Processing, pp. 22\u201326 (2008)","DOI":"10.1109\/CISP.2008.129"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_113.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:57Z","timestamp":1606167597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_113","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}