{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:58Z","timestamp":1742913358810,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438855"},{"type":"electronic","value":"9783662438862"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43886-2_26","type":"book-chapter","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T09:11:39Z","timestamp":1404810699000},"page":"362-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Cheat-Prevention Visual Secret Sharing Scheme with Minimum Pixel Expansion"],"prefix":"10.1007","author":[{"given":"Shenchuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Masaaki","family":"Fujiyoshi","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,9]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/BFb0028462","volume-title":"Information and Communications Security","author":"I Biehl","year":"1997","unstructured":"Biehl, I., Wetzel, S.: Traceable visual cryptography. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 61\u201371. Springer, Heidelberg (1997)"},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.-U.: Contrast-optimal $$k$$ out of $$n$$ secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471\u2013485 (2000)","journal-title":"Theor. Comput. Sci."},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"Cimato, S., Prisco, R.D., Santis, A.D.: Optimal colored visual cryptography schemes. Des. Codes Crypt. 35, 311\u2013335 (2005)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"26_CR6","first-page":"194","volume":"E86\u2013A","author":"T Ishihara","year":"2003","unstructured":"Ishihara, T., Koga, H.: A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86\u2013A(1), 194\u2013197 (2003)","journal-title":"IEICE Trans. Fundam."},{"issue":"2","key":"26_CR7","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10623-010-9449-x","volume":"61","author":"H Koga","year":"2011","unstructured":"Koga, H., Ishihara, T.: A general method for construction of $$(t, n)$$- threshold visual secret sharing schemes for color images. Des. Codes Crypt. 61(2), 223\u2013249 (2011)","journal-title":"Des. Codes Crypt."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"26_CR9","unstructured":"Chang, C.-C., Yu, T.-X.: Sharing a secret gray image in multiple secret. In: Proceedings of International Symposium on Cyber Worlds, pp. 1\u20138 (2002)"},{"issue":"5","key":"26_CR10","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1093\/ietfec\/e89-a.5.1382","volume":"E89","author":"M Iwamoto","year":"2006","unstructured":"Iwamoto, M., Wang, L., Yoneyama, K., Kunihiro, N., Ohta, K.: Visual secret sharing schemes for multiple secret images allowing the rotation of shares. IEICE Trans. Fundam. E89(5), 1382\u20131395 (2006)","journal-title":"IEICE Trans. Fundam."},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TIFS.2011.2170975","volume":"7","author":"M Iwamoto","year":"2012","unstructured":"Iwamoto, M.: A weak security notion for visual secret sharing schemes. IEEE Trans. Inf. Forensics Secur. 7(2), 372\u2013382 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"26_CR12","unstructured":"Iwamoto, M.: Security notions of visual secret sharing schemes. In: Proceedings of IWAIT, pp. 95\u2013100 (2013)"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.ipl.2004.10.011","volume":"93","author":"S Cimato","year":"2005","unstructured":"Cimato, S., De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4), 199\u2013206 (2005)","journal-title":"Inf. Process. Lett."},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"PA Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold visual cryptography with specified whiteness levels of reconstructed pixels. Des. Codes Crypt. 25(1), 15\u201361 (2002)","journal-title":"Des. Codes Crypt."},{"issue":"8","key":"26_CR15","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"DS Tsai","year":"2007","unstructured":"Tsai, D.S., Chen, T.H., Horng, G.: A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recog. 40(8), 2356\u20132366 (2007)","journal-title":"Pattern Recog."},{"issue":"1","key":"26_CR16","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2007","unstructured":"Hu, C.M., Tzeng, W.G.: Cheating prevention in visual cryptography. IEEE Trans. Image Process. 16(1), 36\u201345 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"26_CR17","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1109\/TIP.2012.2190082","volume":"21","author":"YC Chen","year":"2012","unstructured":"Chen, Y.C., Horng, G., Tsai, D.S.: Comment on \u2018cheating prevention in visual cryptography\u2019. IEEE Trans. Image Process. 21(7), 3319\u20133323 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1016\/j.jvcir.2012.08.006","volume":"23","author":"YC Chen","year":"2012","unstructured":"Chen, Y.C., Tsai, D.S., Horng, G.: A new authentication based cheating prevention scheme in Naor-Shamir\u2019s visual cryptography. J. Vis. Commun. Image Represent. 23, 1225\u20131233 (2012)","journal-title":"J. Vis. Commun. Image Represent."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43886-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T07:43:18Z","timestamp":1674891798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43886-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438855","9783662438862"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43886-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"9 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}