{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:33:15Z","timestamp":1725672795682},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_15","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T04:10:23Z","timestamp":1333339823000},"page":"217-227","source":"Crossref","is-referenced-by-count":4,"title":["On the Equivalence of Two Definitions of Visual Cryptography Scheme"],"prefix":"10.1007","author":[{"given":"Teng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C. Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoretical Computer Science\u00a0369, 169\u2013182 (2006)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C. Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics\u00a016(2), 224\u2013261 (2003)","journal-title":"SIAM Journal on Discrete Mathematics"},{"issue":"4","key":"15_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology\u00a012(4), 261\u2013289 (1999)","journal-title":"Journal of Cryptology"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10623-006-0011-9","volume":"40","author":"M. Bose","year":"2006","unstructured":"Bose, M., Mukerjee, R.: Optimal (2, n) visual cryptographic schemes. Designs, Codes and Cryptography\u00a040, 255\u2013267 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10623-009-9327-6","volume":"55","author":"M. Bose","year":"2010","unstructured":"Bose, M., Mukerjee, R.: Optimal (k, n) visual cryptographic schemes for general k. Designs, Codes and Cryptography\u00a055, 19\u201335 (2010)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S. Cimato","year":"2007","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoretical Computer Science\u00a0374, 261\u2013276 (2007)","journal-title":"Theoretical Computer Science"},{"issue":"12","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","volume":"28","author":"C.B. Ciou","year":"2010","unstructured":"Ciou, C.B., Yang, C.N.: Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing\u00a028(12), 1600\u20131610 (2010)","journal-title":"Image and Vision Computing"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"S. Droste","year":"1996","unstructured":"Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 401\u2013415. Springer, Heidelberg (1996)"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science\u00a0240(2), 471\u2013485 (2000)","journal-title":"Theoretical Computer Science"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G.B. Horng","year":"2006","unstructured":"Horng, G.B., Chen, T.H., Tsai, D.S.: Cheating in visual cryptography. Designs, Codes and Cryptography\u00a038, 219\u2013236 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"15_CR12","first-page":"19","volume":"2","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C., Xu, C.S.: A probability-based optimization model for sharing multiple secret images without pixel expansion (in chinese). Journal of Information, Technology and Society\u00a02, 19\u201338 (2003)","journal-title":"Journal of Information, Technology and Society"},{"key":"15_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/11875604_8","volume-title":"Foundations of Intelligent Systems","author":"C.S. Hsu","year":"2006","unstructured":"Hsu, C.S., Tu, S.F., Hou, Y.C.: An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares. In: Esposito, F., Ra\u015b, Z.W., Malerba, D., Semeraro, G. (eds.) ISMIS 2006. LNCS (LNAI), vol.\u00a04203, pp. 58\u201367. Springer, Heidelberg (2006)"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"C.M. Hu","year":"2007","unstructured":"Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Transactions on Image Processing\u00a016(1), 36\u201345 (2007)","journal-title":"IEEE Transactions on Image Processing"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-36178-2_21","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"H. Koga","year":"2002","unstructured":"Koga, H.: A General Formula of the (t,n)-Threshold Visual Secret Sharing Scheme. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 328\u2013345. Springer, Heidelberg (2002)"},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1017\/S096354830200559X","volume":"12","author":"M. Krause","year":"2003","unstructured":"Krause, M., Simon, H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Combinatorics, Probability & Computing\u00a012(3), 285\u2013299 (2003)","journal-title":"Combinatorics, Probability & Computing"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10623-008-9225-3","volume":"50","author":"F. Liu","year":"2009","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography\u00a050, 215\u2013227 (2009)","journal-title":"Designs, Codes and Cryptography"},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TIFS.2009.2037660","volume":"5","author":"F. Liu","year":"2010","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Step construction of visual cryptography schemes. IEEE Transactions on Information Forensics & Security\u00a05(1), 27\u201338 (2010)","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11832072_15","volume-title":"Security and Cryptography for Networks","author":"R. Prisco De","year":"2006","unstructured":"De Prisco, R., De Santis, A.: Cheating Immune (2,n)-Threshold Visual Secret Sharing. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, pp. 216\u2013228. Springer, Heidelberg (2006)"},{"issue":"10","key":"15_CR21","first-page":"2172","volume":"E82-A","author":"R. Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science\u00a0E82-A(10), 2172\u20132177 (1999)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"D.S. Tsai","year":"2007","unstructured":"Tsai, D.S., Chen, T.H., Horng, G.B.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition\u00a040, 2356\u20132366 (2007)","journal-title":"Pattern Recognition"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1019939020426","volume":"27","author":"W.G. Tzeng","year":"2002","unstructured":"Tzeng, W.G., Hu, C.M.: A new approach for visual cryptography. Designs, Codes and Cryptography\u00a027, 207\u2013227 (2002)","journal-title":"Designs, Codes and Cryptography"},{"issue":"3","key":"15_CR24","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z.M. Wang","year":"2009","unstructured":"Wang, Z.M., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics and Security\u00a04(3), 383\u2013396 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters\u00a025, 481\u2013494 (2004)","journal-title":"Pattern Recognition Letters"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.patcog.2006.01.013","volume":"39","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: Reduce shadowsize in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition\u00a039, 1300\u20131314 (2006)","journal-title":"Pattern Recognition"},{"issue":"9","key":"15_CR27","doi-asserted-by":"publisher","first-page":"97005","DOI":"10.1117\/1.2786149","volume":"46","author":"C.N. Yang","year":"2007","unstructured":"Yang, C.N., Chen, T.S.: Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast. Optical Engineering\u00a046(9), 097005 (2007)","journal-title":"Optical Engineering"},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"3114","DOI":"10.1016\/j.patcog.2008.03.031","volume":"41","author":"C.N. Yang","year":"2008","unstructured":"Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recognition\u00a041, 3114\u20133129 (2008)","journal-title":"Pattern Recognition"},{"issue":"24","key":"15_CR29","doi-asserted-by":"publisher","first-page":"4949","DOI":"10.1016\/j.optcom.2010.07.051","volume":"283","author":"C.N. Yang","year":"2010","unstructured":"Yang, C.N., Chung, T.H.: A general multi-secret visual cryptography scheme. Optics Communications\u00a0283(24), 4949\u20134962 (2010)","journal-title":"Optics Communications"},{"issue":"8","key":"15_CR30","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing\u00a015(8), 2441\u20132453 (2006)","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:23:34Z","timestamp":1620127414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}