{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:35Z","timestamp":1725899135256},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_7","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T03:59:28Z","timestamp":1367467168000},"page":"90-101","source":"Crossref","is-referenced-by-count":2,"title":["Visual Cryptography for Natural Images and Visual Voting"],"prefix":"10.1007","author":[{"given":"Teng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"ChuanKun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Information and Computation\u00a0129, 86\u2013106 (1996)","journal-title":"Information and Computation"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography\u00a024, 255\u2013278 (2001)","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C. Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theoretical Computer Science\u00a0369, 169\u2013182 (2006)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. Journal of Cryptology\u00a012(4), 261\u2013289 (1999)","journal-title":"Journal of Cryptology"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S. Cimato","year":"2007","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theoretical Computer Science\u00a0374, 261\u2013276 (2007)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoretical Computer Science\u00a0240(2), 471\u2013485 (2000)","journal-title":"Theoretical Computer Science"},{"key":"7_CR7","first-page":"1","volume":"1773","author":"Y.C. Hou","year":"2003","unstructured":"Hou, Y.C.: Visual cryptography for color images. Pattern Recognition\u00a01773, 1\u201311 (2003)","journal-title":"Pattern Recognition"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/TIP.2010.2056376","volume":"20","author":"I.K. Kang","year":"2011","unstructured":"Kang, I.K., Arce, G.R., Lee, H.K.: Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing\u00a020(1), 132\u2013145 (2011)","journal-title":"IEEE Transactions on Image Processing"},{"key":"7_CR9","unstructured":"Knuth, D.E.: The Art of Computer Programming. Sorting and Searching, vol.\u00a03. Addison-Wesley (1998)"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TIFS.2011.2116782","volume":"6","author":"F. Liu","year":"2011","unstructured":"Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Transactions on Information Forensics & Security\u00a06(2), 307\u2013322 (2011)","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F. Liu","year":"2008","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Information Security\u00a02, 151\u2013165 (2008)","journal-title":"IET Information Security"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s10623-008-9225-3","volume":"50","author":"F. Liu","year":"2009","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: The alignment problem of visual cryptography schemes. Designs, Codes and Cryptography\u00a050, 215\u2013227 (2009)","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR13","unstructured":"Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: WSCG Conference 2002, pp. 303\u2013412 (2002)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","volume":"6","author":"S.J. Shyu","year":"2011","unstructured":"Shyu, S.J., Chen, M.C.: Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Transactions on Information Forensics and Security\u00a06(3), 960\u2013969 (2011)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/TIFS.2011.2117419","volume":"6","author":"D.S. Wang","year":"2011","unstructured":"Wang, D.S., Dong, L., Li, X.B.: Towards shift tolerant visual secret sharing schemes. IEEE Transactions on Information Forensics and Security\u00a06(2), 323\u2013337 (2011)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z.M. Wang","year":"2009","unstructured":"Wang, Z.M., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics and Security\u00a04(3), 383\u2013396 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"7_CR18","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Transactions on Image Processing\u00a015(8), 2441\u20132453 (2006)","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:27:14Z","timestamp":1557674834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}