{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:04:02Z","timestamp":1759385042463,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322044"},{"type":"electronic","value":"9783642322051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32205-1_17","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T10:09:01Z","timestamp":1342260541000},"page":"196-210","source":"Crossref","is-referenced-by-count":18,"title":["Authenticating Visual Cryptography Shares Using 2D Barcodes"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Weir","sequence":"first","affiliation":[]},{"given":"WeiQi","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/BFb0028462","volume-title":"Information and Communications Security","author":"I. Biehl","year":"1997","unstructured":"Biehl, I., Wetzel, S.: Traceable Visual Cryptography. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 61\u201371. Springer, Heidelberg (1997)"},{"key":"17_CR2","unstructured":"Brown, J.: ZBar bar code reader, http:\/\/zbar.sourceforge.net\/"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-540-69304-8_49","volume-title":"Intelligence and Security Informatics","author":"C.-W. Chan","year":"2008","unstructured":"Chan, C.-W., Lin, C.-H.: A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol.\u00a05075, pp. 467\u2013476. Springer, Heidelberg (2008)"},{"key":"17_CR4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3233\/FI-2009-0064","volume":"92","author":"C.C. Chang","year":"2009","unstructured":"Chang, C.C., Chen, T.H., Liu, L.J.: Preventing cheating in computational visual cryptography. Fundamenta Informaticae\u00a092, 27\u201342 (2009)","journal-title":"Fundamenta Informaticae"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1093\/comjnl\/bxp068","volume":"53","author":"R. Prisco De","year":"2010","unstructured":"De Prisco, R., De Santis, A.: Cheating immune threshold visual secret sharing. The Computer Journal\u00a053, 1485\u20131496 (2010), http:\/\/dx.doi.org\/10.1093\/comjnl\/bxp068","journal-title":"The Computer Journal"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Hegde, C., Manu, S., Shenoy, P., Venugopal, K., Patnaik, L.: Secure authentication using image processing and visual cryptography for banking applications. In: 16th International Conference on Advanced Computing and Communications, pp. 65\u201372 (December 2008)","DOI":"10.1109\/ADCOM.2008.4760429"},{"issue":"2","key":"17_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G. Horng","year":"2006","unstructured":"Horng, G., Chen, T., Tsai, D.S.: Cheating in visual cryptography. Designs, Codes and Cryptography\u00a038(2), 219\u2013236 (2006)","journal-title":"Designs, Codes and Cryptography"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"C.M. Hu","year":"2007","unstructured":"Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Transactions on Image Processing\u00a016(1), 36\u201345 (2007)","journal-title":"IEEE Transactions on Image Processing"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M. Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 322\u2013336. Springer, Heidelberg (1997)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Rouillard, J.: Contextual qr codes. In: ICCGI 2008. The Third International Multi-Conference on Computing in the Global Information Technology, July 27-August 1, pp. 50\u201355 (2008)","DOI":"10.1109\/ICCGI.2008.25"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"D.S. Tsai","year":"2007","unstructured":"Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognition\u00a040, 2356\u20132366 (2007), http:\/\/portal.acm.org\/citation.cfm?id=1240339.1240571","journal-title":"Pattern Recognition"},{"key":"17_CR13","unstructured":"Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography\u00a037, 169\u2013186 (2005), 10.1007\/s10623-004-3816-4"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-540-39881-3_23","volume-title":"Security in Pervasive Computing","author":"P. Tuyls","year":"2004","unstructured":"Tuyls, P., Kevenaar, T., Schrijen, G.-J., Staring, T., van Dijk, M.: Visual Crypto Displays Enabling Secure Communications. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 271\u2013284. Springer, Heidelberg (2004)"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: IEEE International Symposium on Circuits and Systems, ISCAS 2010 (May 2010)","DOI":"10.1109\/ISCAS.2010.5537511"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-03688-0_14","volume-title":"Digital Watermarking","author":"J. Weir","year":"2009","unstructured":"Weir, J., Yan, W.-Q.: Dot-Size Variant Visual Cryptography. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol.\u00a05703, pp. 136\u2013148. Springer, Heidelberg (2009)"},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/IMVIP.2009.18","volume-title":"Proceedings of the International Machine Vision and Image Processing Conference","author":"J. Weir","year":"2009","unstructured":"Weir, J., Yan, W.: Image hatching for visual cryptography. In: Proceedings of the International Machine Vision and Image Processing Conference, pp. 59\u201364. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"17_CR18","unstructured":"Yang, C., Laih, C.: Some new types of visual secret sharing schemes. In: National Computer Symposium (NCS 1999), vol. III, pp. 260\u2013268 (December 1999)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32205-1_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:57:09Z","timestamp":1620129429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32205-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322044","9783642322051"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32205-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}