{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T11:52:53Z","timestamp":1777290773648,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642545245","type":"print"},{"value":"9783642545252","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_21","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"231-238","source":"Crossref","is-referenced-by-count":11,"title":["On the Extensions of (k, n)*-Visual Cryptographic Schemes"],"prefix":"10.1007","author":[{"given":"Kanakkath","family":"Praveen","sequence":"first","affiliation":[]},{"given":"K.","family":"Rajeev","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sethumadhavan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Arumugam, S., Lakshmanan, R., Nagar, A.K.: On (k, n)*-Visual Cryptography Scheme. Designs, Codes and Cryptography (2012), doi:10.1007\/s10623-012-9722-2","DOI":"10.1007\/s10623-012-9722-2"},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Information and Computation\u00a0129(2), 86\u2013106 (1996)","journal-title":"Information and Computation"},{"issue":"3","key":"21_CR3","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., Bonis, A.D., De Santis, A.: Improved schemes for visual cryptography. Designs, Codes and Cryptography\u00a024(3), 255\u2013278 (2001)","journal-title":"Designs, Codes and Cryptography"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/3-540-68697-5_30","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"S. Droste","year":"1996","unstructured":"Droste, S.: New Results on Visual Cryptography. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 401\u2013415. Springer, Heidelberg (1996)"},{"key":"21_CR5","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundamentals\u00a0E82-A(10), 2172\u20132177 (1999)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"37","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., Hollmann, H.D.L., Lint, J.H.V., Tolhuizen, L.: XOR-based visual cryptography schemes. Designs, Codes and Cryptography\u00a037(1), 169\u2013186 (2005)","journal-title":"Designs, Codes and Cryptography"},{"issue":"6","key":"21_CR8","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1049\/iet-ifs.2012.0046","volume":"4","author":"X. Wu","year":"2012","unstructured":"Wu, X., Wei, S.: Visual secret sharing for general access structures by random grids. Information Security, IET\u00a04(6), 299\u2013309 (2012)","journal-title":"Information Security, IET"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New Visual Secret Sharing Schemes Using Probabilistic Method. Pattern Recognition Letters\u00a025(4), 481\u2013494 (2004)","journal-title":"Pattern Recognition Letters"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T02:03:44Z","timestamp":1558836224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}