{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T21:10:01Z","timestamp":1742850601852,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642293603"},{"type":"electronic","value":"9783642293610"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29361-0_11","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T06:56:25Z","timestamp":1333349785000},"page":"63-75","source":"Crossref","is-referenced-by-count":2,"title":["Color Image Sharing Method Based on Lagrange\u2019s Interpolating Polynomial"],"prefix":"10.1007","author":[{"given":"Guiqiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jianjun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liqin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"6","key":"11_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/S0020-0190(00)00108-3","volume":"75","author":"C. Blundo","year":"2000","unstructured":"Blundo, C., De Santis, A., Naor, M.: Visual cryptography for grey level images. Information Processing Letters\u00a075(6), 255\u2013259 (2000)","journal-title":"Information Processing Letters"},{"issue":"7","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C.: Visual cryptography for color images. Pattern Recognition\u00a036(7), 1619\u20131629 (2003)","journal-title":"Pattern Recognition"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, I.C.: A New (t,n) Threshold Image Hiding Scheme for Sharing a Secret Color Image. In: Proceedings of the International Conference on Communication Technology, Beijing, vol.\u00a01, pp. 196\u2013202 (2003)","DOI":"10.1109\/ICCT.2003.1209067"},{"issue":"8","key":"11_CR5","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/S0167-8655(02)00023-5","volume":"23","author":"C.C. Chang","year":"2002","unstructured":"Chang, C.C., Chuang, J.C.: An image intellectual property protection scheme for gray level images using visual secret sharing strategy. Pattern Recognition Letters\u00a023(8), 931\u2013941 (2002)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/S0096-3003(03)00355-2","volume":"151","author":"C.C. Yang","year":"2004","unstructured":"Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t,n) multi-secret sharing scheme. Applied Mathematics and Computations\u00a0151(2), 483\u2013490 (2004)","journal-title":"Applied Mathematics and Computations"},{"issue":"9","key":"11_CR7","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1049\/el:20040381","volume":"40","author":"R. Lukac","year":"2004","unstructured":"Lukac, R., Plataniotis, K.N.: Color image secret sharing. Electronics Letters\u00a040(9), 529\u2013531 (2004)","journal-title":"Electronics Letters"},{"issue":"12","key":"11_CR8","first-page":"285","volume":"33","author":"Lvchao","year":"2005","unstructured":"Lvchao, Yu, M., Liu, Y.: The secret image sharing scheme based on Lagrange interpolation polynomial. Journal of Huazhong University of Science and Technology\u00a033(12), 285\u2013289 (2005)","journal-title":"Journal of Huazhong University of Science and Technology"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-3-540-85920-8_77","volume-title":"Progress in Pattern Recognition, Image Analysis and Applications","author":"A.M. Rey del","year":"2008","unstructured":"del Rey, A.M.: A Matrix-Based Secret Sharing Scheme for Images. In: Ruiz-Shulcloper, J., Kropatsch, W.G. (eds.) CIARP 2008. LNCS, vol.\u00a05197, pp. 635\u2013642. Springer, Heidelberg (2008)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-16687-7_26","volume-title":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","author":"E. Elsheh","year":"2010","unstructured":"Elsheh, E., Ben Hamza, A.: Comments on Matrix-Based Secret Sharing Scheme for Images. In: Bloch, I., Cesar Jr., R.M. (eds.) CIARP 2010. LNCS, vol.\u00a06419, pp. 169\u2013175. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Health Information Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29361-0_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T20:37:43Z","timestamp":1742848663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29361-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642293603","9783642293610"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29361-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}