{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:02:27Z","timestamp":1746244947562,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550454"},{"type":"electronic","value":"9783642550461"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55046-1_5","type":"book-chapter","created":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T10:49:12Z","timestamp":1395658152000},"page":"68-90","source":"Crossref","is-referenced-by-count":12,"title":["A Novel Perceptual Secret Sharing Scheme"],"prefix":"10.1007","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"given":"Jianzhi","family":"Sang","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T.H. Chen","year":"2011","unstructured":"Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw.\u00a084(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"issue":"8","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z. Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process.\u00a015(8), 2441\u20132453 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"10","key":"5_CR3","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D. Wang","year":"2007","unstructured":"Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit.\u00a040(10), 2776\u20132785 (2007)","journal-title":"Pattern Recognit."},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z. Wang","year":"2009","unstructured":"Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security\u00a04(3), 383\u2013396 (2009)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"5_CR5","first-page":"121","volume":"1","author":"F. Yi","year":"2008","unstructured":"Yi, F., Wang, D., Li, S., Dai, Y.: Probabilistic visual cryptography scheme with reversing. J. Tsinghua Univ. (Sci. & Tech.)\u00a01, 121\u2013123 (2008)","journal-title":"J. Tsinghua Univ. (Sci. & Tech.)"},{"key":"5_CR6","first-page":"877","volume":"4","author":"L. Li","year":"2012","unstructured":"Li, L., El-Latif, A.A.A., Shi, Z., Niu, X.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Research Journal of Applied Sciences Engineering and Technology\u00a04, 877\u2013883 (2012)","journal-title":"Research Journal of Applied Sciences Engineering and Technology"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Yang, B., Busch, C., Niu, X.: Perceptual image encryption via reversible histogram spreading. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009, pp. 471\u2013476. IEEE (2009)","DOI":"10.1109\/ISPA.2009.5297674"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1109\/TCE.2003.1196437","volume":"48","author":"A. Torrubia","year":"2002","unstructured":"Torrubia, A., Mora, F.: Perceptual cryptography on mpeg layer iii bit-streams. IEEE Trans. Consumer Electronics\u00a048(4), 1046\u20131050 (2002)","journal-title":"IEEE Trans. Consumer Electronics"},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/TCSVT.2006.888840","volume":"17","author":"S. Li","year":"2007","unstructured":"Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.T.: On the design of perceptual mpeg-video encryption algorithms. IEEE Trans. Circuits Syst. Video Tech.\u00a017(2), 214\u2013223 (2007)","journal-title":"IEEE Trans. Circuits Syst. Video Tech."},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-14298-7_5","volume-title":"Transactions on Data Hiding and Multimedia Security V","author":"J. Weir","year":"2010","unstructured":"Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol.\u00a06010, pp. 70\u2013105. Springer, Heidelberg (2010)"},{"issue":"1","key":"5_CR12","first-page":"74","volume":"31","author":"X. Wu","year":"2011","unstructured":"Wu, X., Sun, W.: Image sharing scheme based on error diffusion. J. Comput. Appl.\u00a031(1), 74\u201381 (2011)","journal-title":"J. Comput. Appl."},{"issue":"13","key":"5_CR13","doi-asserted-by":"publisher","first-page":"275","DOI":"10.4156\/jdcta.vol6.issue13.30","volume":"6","author":"L. Li","year":"2012","unstructured":"Li, L., Yan, X., Wang, N., El-Latif, A.A.A., Niu, X.: Meaningful image sharing threshold scheme based on error diffusion. Int. J. Digit. Content Technol. Appl. (JDCTA)\u00a06(13), 275\u2013284 (2012)","journal-title":"Int. J. Digit. Content Technol. Appl. (JDCTA)"},{"issue":"1","key":"5_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci.\u00a0250(1), 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"5_CR15","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O. Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Letters\u00a012(6), 377\u2013379 (1987)","journal-title":"Optics Letters"},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"S.J. Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recognition\u00a040(3), 1014\u20131031 (2007)","journal-title":"Pattern Recognition"},{"issue":"12","key":"5_CR17","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1109\/TCSVT.2003.819176","volume":"13","author":"C.C. Thien","year":"2003","unstructured":"Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol.\u00a013(12), 1161\u20131169 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.csi.2007.10.012","volume":"31","author":"R. Zhao","year":"2009","unstructured":"Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces\u00a031(1), 252\u2013257 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"5_CR19","doi-asserted-by":"crossref","first-page":"033019","DOI":"10.1117\/1.1993625","volume":"14","author":"D. Jin","year":"2005","unstructured":"Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. Journal of Electronic Imaging\u00a014(3), 033019\u2013033019 (2005)","journal-title":"Journal of Electronic Imaging"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Information Sciences (2013)","DOI":"10.1016\/j.ins.2013.01.006"},{"issue":"11","key":"5_CR21","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1109\/TCSVT.2011.2106291","volume":"21","author":"Y.C. Hou","year":"2011","unstructured":"Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. on Circ. and Sys. for Video Tech.\u00a021(11), 1760\u20131764 (2011)","journal-title":"IEEE Trans. on Circ. and Sys. for Video Tech."},{"issue":"4","key":"5_CR22","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1134\/S1054661806040080","volume":"16","author":"W.P. Fang","year":"2006","unstructured":"Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Pattern Recognition and Image Analysis\u00a016(4), 632\u2013636 (2006)","journal-title":"Pattern Recognition and Image Analysis"},{"issue":"11","key":"5_CR23","doi-asserted-by":"publisher","first-page":"117001","DOI":"10.1117\/1.3262345","volume":"48","author":"S.K. Chen","year":"2009","unstructured":"Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Optical Engineering\u00a048(11), 117001\u2013117001 (2009)","journal-title":"Optical Engineering"},{"issue":"12","key":"5_CR24","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1016\/j.patcog.2005.04.002","volume":"38","author":"S.K. Chen","year":"2005","unstructured":"Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognition\u00a038(12), 2466\u20132471 (2005)","journal-title":"Pattern Recognition"},{"issue":"3","key":"5_CR25","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.jss.2009.10.012","volume":"83","author":"C.P. Huang","year":"2010","unstructured":"Huang, C.P., Hsieh, C.H., Huang, P.S.: Progressive sharing for a secret image. J. Syst. Softw.\u00a083(3), 517\u2013527 (2010)","journal-title":"J. Syst. Softw."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: Threshold visual secret sharing based on boolean operations (2013) (to be appear)","DOI":"10.1007\/978-3-319-12643-2_75"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of or and xor decryptions. J. Vis. Commun. Image R (2012)","DOI":"10.1016\/j.jvcir.2012.11.001"},{"key":"5_CR28","unstructured":"Nist\/sematech e-handbook of statistical methods, http:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/eda3652.htm"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Processing (2012)","DOI":"10.1016\/j.sigpro.2012.11.014"},{"issue":"2","key":"5_CR30","first-page":"118","volume":"4","author":"X. Yan","year":"2013","unstructured":"Yan, X., Wang, S., Li, L., El-Latif, A.A.A., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. J. Inf. Hiding Multimedia Signal Process (JIHMSP)\u00a04(2), 118\u2013126 (2013)","journal-title":"J. Inf. Hiding Multimedia Signal Process. (JIHMSP)"},{"issue":"4","key":"5_CR31","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett.\u00a025(4), 481\u2013494 (2004)","journal-title":"Pattern Recognit. Lett."},{"issue":"11","key":"5_CR32","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/TCSVT.2011.2133470","volume":"21","author":"T.H. Chen","year":"2011","unstructured":"Chen, T.H., Tsao, K.H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. on Circ. and Sys. for Video Tech.\u00a021(11), 1693\u20131703 (2011)","journal-title":"IEEE Trans. on Circ. and Sys. for Video Tech."}],"container-title":["Lecture Notes in Computer Science","Transactions on Data Hiding and Multimedia Security IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55046-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:10Z","timestamp":1746159310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55046-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550454","9783642550461"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55046-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}