{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:03:10Z","timestamp":1743825790596,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322044"},{"type":"electronic","value":"9783642322051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32205-1_18","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T10:09:01Z","timestamp":1342260541000},"page":"211-227","source":"Crossref","is-referenced-by-count":3,"title":["Flexible Visual Cryptography Scheme without Distortion"],"prefix":"10.1007","author":[{"given":"Feng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Teng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ching-Nung","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"S. Droste","year":"1996","unstructured":"Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 401\u2013415. Springer, Heidelberg (1996)"},{"issue":"4","key":"18_CR3","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology\u00a012(4), 261\u2013289 (1999)","journal-title":"Journal of Cryptology"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S. Cimato","year":"2005","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Optimal colored threshold visual cryptography schemes. Designs, Codes and Cryptography\u00a035, 311\u2013335 (2005)","journal-title":"Designs, Codes and Cryptography"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1017\/S096354830200559X","volume":"12","author":"M. Krause","year":"2003","unstructured":"Krause, M., Simon, H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Combinatorics, Probability & Computing\u00a012(3), 285\u2013299 (2003)","journal-title":"Combinatorics, Probability & Computing"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-540-24660-2_27","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"D.Q. Viet","year":"2004","unstructured":"Viet, D.Q., Kurosawa, K.: Almost Ideal Contrast Visual Cryptography with Reversing. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 353\u2013365. Springer, Heidelberg (2004)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-36178-2_21","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"H. Koga","year":"2002","unstructured":"Koga, H.: A General Formula of the (t,n)-Threshold Visual Secret Sharing Scheme. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 328\u2013345. Springer, Heidelberg (2002)"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10623-009-9327-6","volume":"55","author":"M. Bose","year":"2010","unstructured":"Bose, M., Mukerjee, R.: Optimal (k,n) visual cryptographic schemes for general k. Designs, Codes and Cryptography\u00a055, 19\u201335 (2010)","journal-title":"Designs, Codes and Cryptography"},{"issue":"2","key":"18_CR9","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TIFS.2011.2116782","volume":"6","author":"F. Liu","year":"2011","unstructured":"Liu, F., Wu, C.K.: Embedded meaningful share visual cryptography schemes. IEEE Transactions on Information Forensics & Security\u00a06(2), 307\u2013322 (2011)","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TIFS.2009.2037660","volume":"5","author":"F. Liu","year":"2010","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Step construction of visual cryptography schemes. IEEE Transactions on Information Forensics & Security\u00a05(1), 27\u201338 (2010)","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ipl.2010.01.003","volume":"110","author":"F. Liu","year":"2010","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: A new definition of the contrast of visual cryptography scheme. Information Processing Letters\u00a0110, 241\u2013246 (2010)","journal-title":"Information Processing Letters"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"issue":"1-2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. ACM Theoretical Computer Science\u00a0250(1-2), 143\u2013161 (2001)","journal-title":"ACM Theoretical Computer Science"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. In: Proceedings of 2003 International Conference on Image Processing, vol.\u00a01, pp. I\u2013521\u2013I\u2013524 (2003)","DOI":"10.1109\/ICIP.2003.1247013"},{"key":"18_CR15","first-page":"77","volume":"1","author":"B. Surekha","year":"2010","unstructured":"Surekha, B., Swamy, G., Rao, K.S.: A multiple watermarking technique for images based on visual cryptography. Computer Applications\u00a01, 77\u201381 (2010)","journal-title":"Computer Applications"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.procs.2010.11.018","volume":"2","author":"T. Monoth","year":"2010","unstructured":"Monoth, T., Babu Anto, P.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Computer Science\u00a02, 143\u2013148 (2010)","journal-title":"Procedia Computer Science"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.: Resolution variant visual cryptography for street view of google maps. In: Proceedings of the ISCAS, pp. 1695\u20131698 (2010)","DOI":"10.1109\/ISCAS.2010.5537511"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Cimato, S., Yang, C.N.: Visual cryptography and secret image sharing. CRC Press, Taylor & Francis (2011)","DOI":"10.1201\/b11068"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Letters\u00a026, 193\u2013206 (2005)","journal-title":"Pattern Recognition Letters"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.patcog.2006.01.013","volume":"39","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: Reduce shadowsize in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition\u00a039, 1300\u20131314 (2006)","journal-title":"Pattern Recognition"},{"key":"18_CR21","first-page":"95","volume":"1","author":"Y.C. Hou","year":"2004","unstructured":"Hou, Y.C., Tu, C.F.: Visual cryptography techniques for color images without pixel expansion. Journal of Information, Technology and Society\u00a01, 95\u2013110 (2004) (in Chinese)","journal-title":"Journal of Information, Technology and Society"},{"issue":"10","key":"18_CR22","first-page":"2172","volume":"E82-A","author":"R. Ito","year":"1999","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science\u00a0E82-A(10), 2172\u20132177 (1999)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science"},{"issue":"1","key":"18_CR23","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S. Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. The Computer Journal\u00a049(1), 97\u2013107 (2006)","journal-title":"The Computer Journal"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters\u00a025, 481\u2013494 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"9","key":"18_CR25","doi-asserted-by":"publisher","first-page":"97005","DOI":"10.1117\/1.2786149","volume":"46","author":"C.N. Yang","year":"2007","unstructured":"Yang, C.N., Chen, T.S.: Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast. Optical Engineering\u00a046(9), 097005 (2007)","journal-title":"Optical Engineering"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10623-008-9225-3","volume":"50","author":"F. Liu","year":"2009","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography\u00a050, 215\u2013227 (2009)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR27","unstructured":"Biham, E., Itzkovitz, A.: Visual cryptography with polarization. In: The Dagstuhl seminar on Cryptography, and in the RUMP session of CRYPTO 1998 (September 1997)"},{"issue":"5","key":"18_CR28","first-page":"1193","volume":"E87-A","author":"H. Kuwakado","year":"2004","unstructured":"Kuwakado, H., Tanaka, H.: Size-reduced visual secret sharing scheme. IEICE Transactions on Fundamentals\u00a0E87-A(5), 1193\u20131197 (2004)","journal-title":"IEICE Transactions on Fundamentals"},{"issue":"9","key":"18_CR29","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1093\/ietfec\/e88-a.9.2471","volume":"E88-A","author":"C.N. Yang","year":"2005","unstructured":"Yang, C.N., Chen, T.S.: Size-adjustable visual secret sharing schemes. IEICE Transactions on Fundamentals\u00a0E88-A(9), 2471\u20132474 (2005)","journal-title":"IEICE Transactions on Fundamentals"},{"issue":"2","key":"18_CR30","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1093\/ietfec\/e89-a.2.620","volume":"E89-A","author":"C.N. Yang","year":"2006","unstructured":"Yang, C.N., Chen, T.S.: New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE Transactions on Fundamentals\u00a0E89-A(2), 620\u2013625 (2006)","journal-title":"IEICE Transactions on Fundamentals"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32205-1_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:27:14Z","timestamp":1743740834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32205-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322044","9783642322051"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32205-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}