{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:20:53Z","timestamp":1726410053037},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642379482"},{"type":"electronic","value":"9783642379499"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37949-9_66","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T07:42:10Z","timestamp":1372923730000},"page":"764-770","source":"Crossref","is-referenced-by-count":0,"title":["Image Secret Sharing in Stego-Images with Authentication"],"prefix":"10.1007","author":[{"given":"Amitava","family":"Nag","sequence":"first","affiliation":[]},{"given":"Sushanta","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Debasree","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Partha Pratim","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","unstructured":"Blakely, G.R.: Safeguarding cryptography keys. In: Proc. of AFIPS National Computer Conference, vol.\u00a048, pp. 313\u2013317 (1979)"},{"issue":"11","key":"66_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"issue":"5","key":"66_CR3","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C.C. Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: Secret image sharing. Computer Graphics\u00a026(5), 765\u2013770 (2002)","journal-title":"Computer Graphics"},{"issue":"12","key":"66_CR4","first-page":"1161","volume":"13","author":"C.C. Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Transactions on Circuit System\u00a013(12), 1161\u20131169 (2003)","journal-title":"IEEE Transactions on Circuit System"},{"issue":"3","key":"66_CR5","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/LSP.2009.2038113","volume":"17","author":"Y.Y. Lin","year":"2010","unstructured":"Lin, Y.Y., Wang, R.Z.: Scalable Secret Image Sharing with Smaller Shadow Images. IEEE Signal Processing Letters\u00a017(3), 316\u2013319 (2010)","journal-title":"IEEE Signal Processing Letters"},{"key":"66_CR6","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"C.C. Lin","year":"2004","unstructured":"Lin, C.C., Tsai, W.H.: Secret Image sharing with steganography and authentication. Journal of Systems and Software\u00a073, 405\u2013414 (2004)","journal-title":"Journal of Systems and Software"},{"key":"66_CR7","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"C.N. Yang","year":"2007","unstructured":"Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. Journal of Systems and Software\u00a080, 1070\u20131076 (2007)","journal-title":"Journal of Systems and Software"},{"key":"66_CR8","doi-asserted-by":"publisher","first-page":"3130","DOI":"10.1016\/j.patcog.2008.04.006","volume":"41","author":"C.C. Chang","year":"2008","unstructured":"Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recognition\u00a041, 3130\u20133137 (2008)","journal-title":"Pattern Recognition"},{"issue":"1","key":"66_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.patcog.2009.06.007","volume":"43","author":"Z. Eslami","year":"2010","unstructured":"Eslami, Z., Razzaghi, S.H., Ahmadabadi, J.Z.: Secret image sharing based on cellular automata and steganography. Pattern Recognition\u00a043(1), 397\u2013404 (2010)","journal-title":"Pattern Recognition"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37949-9_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T06:36:55Z","timestamp":1557902215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37949-9_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642379482","9783642379499"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37949-9_66","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}