{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:34:22Z","timestamp":1743003262832,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166860"},{"type":"electronic","value":"9783642166877"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16687-7_26","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:47:55Z","timestamp":1288691275000},"page":"169-175","source":"Crossref","is-referenced-by-count":3,"title":["Comments on Matrix-Based Secret Sharing Scheme for Images"],"prefix":"10.1007","author":[{"given":"Esam","family":"Elsheh","sequence":"first","affiliation":[]},{"given":"A.","family":"Ben Hamza","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"26_CR1","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H. Cheng","year":"2000","unstructured":"Cheng, H., Xiaobo, L.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process.\u00a048(8), 2439\u20132451 (2000)","journal-title":"IEEE Trans. Signal Process."},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MMUL.2003.1218259","volume":"10","author":"N. Bourbakis","year":"2003","unstructured":"Bourbakis, N., Dollas, A.: Scan-based compression-encryption hiding for video on demand. IEEE Multimedia Mag.\u00a010, 79\u201387 (2003)","journal-title":"IEEE Multimedia Mag."},{"issue":"8","key":"26_CR3","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"L.M. Marvel","year":"1999","unstructured":"Marvel, L.M., Boncelet, C.G., Retter, C.T.: Spread spectrum image steganography. IEEE Trans. Image Process.\u00a08(8), 1075\u20131083 (1999)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"26_CR4","first-page":"1062","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proc. IEEE, Special Issue on Protection of Multimedia Content\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proc. IEEE, Special Issue on Protection of Multimedia Content"},{"issue":"11","key":"26_CR5","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. ACM Comm.\u00a022(11), 612\u2013613 (1979)","journal-title":"ACM Comm."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptography keys. In: Proc. of the AFIPS 1979 National Computer Conference, vol.\u00a048, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"26_CR7","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"D. Tsai","year":"2007","unstructured":"Tsai, D., Chen, T., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn.\u00a040, 2356\u20132366 (2007)","journal-title":"Pattern Recogn."},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/S0020-0255(98)10011-7","volume":"111","author":"C. Chang","year":"1998","unstructured":"Chang, C., Hwang, R.: Sharing secret images using shadow codebooks. Inform. Sciences\u00a0111, 335\u2013345 (1998)","journal-title":"Inform. Sciences"},{"issue":"6","key":"26_CR10","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","volume":"27","author":"R.Z. Wang","year":"2006","unstructured":"Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recognition Letters\u00a027(6), 551\u2013555 (2006)","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"26_CR11","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C.C. Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: Secret image sharing. Computers and Graphics\u00a026(1), 765\u2013770 (2002)","journal-title":"Computers and Graphics"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1016\/j.patcog.2004.01.002","volume":"37","author":"Y. Wu","year":"2004","unstructured":"Wu, Y., Thien, L., Lin, J.: Sharing and hiding secret images with size constrain. Pattern Recogn.\u00a037, 1377\u20131385 (2004)","journal-title":"Pattern Recogn."},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-3-540-85920-8_77","volume-title":"Progress in Pattern Recognition, Image Analysis and Applications","author":"M.D. Rey","year":"2008","unstructured":"Rey, M.D.: A matrix-based secret sharing scheme for images. In: Ruiz-Shulcloper, J., Kropatsch, W.G. (eds.) CIARP 2008. LNCS, vol.\u00a05197, pp. 635\u2013642. Springer, Heidelberg (2008)"},{"key":"26_CR14","unstructured":"Bard, G.: Algorithms for the solution of linear and polynomial systems of equations over finite fields, with applications to cryptanalysis. PhD thesis, Department of Applied Mathematics and Scientific Computation, University of Maryland at College Park (2007)"},{"issue":"4","key":"26_CR15","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s00453-008-9192-0","volume":"56","author":"C. Studholme","year":"2010","unstructured":"Studholme, C., Blake, I.F.: Random Matrices and Codes for the Erasure Channel. Algorithmica\u00a056(4), 605\u2013620 (2010)","journal-title":"Algorithmica"},{"key":"26_CR16","unstructured":"William, S.: Sage Mathematics Software (Version 4.4.2). The Sage Group (2010), \n                    \n                      http:\/\/www.sagemath.org"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16687-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T17:14:48Z","timestamp":1580318088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16687-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166860","9783642166877"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16687-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}