{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:32:47Z","timestamp":1725456767606},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642347030"},{"type":"electronic","value":"9783642347047"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34704-7_7","type":"book-chapter","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T02:38:37Z","timestamp":1350614317000},"page":"86-92","source":"Crossref","is-referenced-by-count":4,"title":["Multi-pixel Encryption Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Teng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"7_CR2","unstructured":"Chang, C.Y.: Visual cryptography for color images. MS thesis, National Central University, Taiwan (2000)"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","volume":"177","author":"Y.F. Chen","year":"2007","unstructured":"Chen, Y.F., Chan, Y.K., Huang, C.C., Tsai, M.H., Chu, Y.P.: A multiple-level visual secret-sharing scheme without image size expansion. Information Sciences\u00a0177, 4696\u20134710 (2007)","journal-title":"Information Sciences"},{"key":"7_CR4","unstructured":"Goldreich, O.: A note on computational indistinguishability (1989), \n                  \n                    http:\/\/www.wisdom.weizmann.ac.il\/~oded\/PS\/iplnote.ps"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Foundations of cryptography: Basic tools, vol.\u00a01, p. 392. Cambridge University Press (2001)","DOI":"10.1017\/CBO9780511546891"},{"key":"7_CR6","unstructured":"Goldwasser, S., Bellare, M.: Lecture notes on cryptography, (2008), \n                  \n                    http:\/\/cseweb.ucsd.edu\/~mihir\/papers\/gb.pdf"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/BFb0045084","volume-title":"Computing and Combinatorics","author":"T. Hofmeister","year":"1997","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-Optimal k Out of n Secret Sharing Schemes in Visual Cryptography. In: Jiang, T., Lee, D.T. (eds.) COCOON 1997. LNCS, vol.\u00a01276, pp. 176\u2013185. Springer, Heidelberg (1997)"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science\u00a0240(2), 471\u2013485 (2000)","journal-title":"Theoretical Computer Science"},{"key":"7_CR9","first-page":"95","volume":"1","author":"Y.C. Hou","year":"2004","unstructured":"Hou, Y.C., Tu, C.F.: Visual cryptography techniques for color images without pixel expansion. Journal of Information, Technology and Society\u00a01, 95\u2013110 (2004) (in Chinese)","journal-title":"Journal of Information, Technology and Society"},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1017\/S096354830200559X","volume":"12","author":"M. Krause","year":"2003","unstructured":"Krause, M., Simon, H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Combinatorics, Probability & Computing\u00a012(3), 285\u2013299 (2003)","journal-title":"Combinatorics, Probability & Computing"},{"key":"7_CR11","unstructured":"Lin, C.H.: Visual cryptography for color images with image size invariable shares. MS thesis, National Central University, Taiwan (2002)"},{"issue":"4","key":"7_CR12","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F. Liu","year":"2008","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Information Security\u00a02(4), 151\u2013165 (2008)","journal-title":"IET Information Security"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"7_CR14","unstructured":"Tu, S.F.: On the design of protection scheme for digital images and documents based on visual secret sharing and steganography. PhD thesis, National Central University, Taiwan (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34704-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T06:43:25Z","timestamp":1557297805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34704-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642347030","9783642347047"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34704-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}