{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:44:43Z","timestamp":1725597883292},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_51","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:01:51Z","timestamp":1311609711000},"page":"498-505","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods"],"prefix":"10.1007","author":[{"given":"Aishwarya","family":"Nandakumar","sequence":"first","affiliation":[]},{"given":"P.","family":"Harmya","sequence":"additional","affiliation":[]},{"given":"Noopa","family":"Jagadeesh","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Anju","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"51_CR1","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J. Fridrich","year":"2006","unstructured":"Fridrich, J., Soukal, D.: Matrix Embedding for large payloads. IEEE Transactions on Information, Security and Forensics\u00a01(3), 390\u2013395 (2006)","journal-title":"IEEE Transactions on Information, Security and Forensics"},{"key":"51_CR2","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O. Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optical Letters\u00a012, 377\u2013379 (1987)","journal-title":"Optical Letters"},{"key":"51_CR3","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"S.J. Shyu","year":"2006","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recognition\u00a040, 1014\u20131031 (2006)","journal-title":"Pattern Recognition"},{"key":"51_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Abboud, G., Marean, J., Roman, Yampolskiy, V.: Steganography and Visual Cryptography in Computer Forensics. In: Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (2010)","DOI":"10.1109\/SADFE.2010.14"},{"issue":"7","key":"51_CR6","first-page":"1018","volume":"87","author":"F.A.P. Petitcolas","year":"1996","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding-A Survey. Proceedings of the IEEE, special issue on protection of multimedia content\u00a087(7), 1018\u20131062 (1996)","journal-title":"Proceedings of the IEEE, special issue on protection of multimedia content"},{"key":"51_CR7","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1016\/j.optcom.2010.06.042","volume":"283","author":"R.Z. Wang","year":"2010","unstructured":"Wang, R.Z., Lan, Y.C., Lee, Y.K., Huang, S.Y.: Incrementing visual cryptography using Random Grids. Optics Communications\u00a0283, 4242\u20134249 (2010)","journal-title":"Optics Communications"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T09:14:53Z","timestamp":1560417293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_51","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}