{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:32:47Z","timestamp":1742931167938,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":14,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132217701"},{"type":"electronic","value":"9788132217718"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1771-8_4","type":"book-chapter","created":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T23:19:35Z","timestamp":1393888775000},"page":"35-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AnimVSS: Frame-Based Visual Secret Sharing"],"prefix":"10.1007","author":[{"given":"Neil","family":"Buckley","sequence":"first","affiliation":[]},{"given":"Atulya K.","family":"Nagar","sequence":"additional","affiliation":[]},{"given":"S.","family":"Arumugam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,4]]},"reference":[{"key":"4_CR1","unstructured":"Chang, J.J., Juan, J.S.: Two-Secret image sharing scheme by shifting random grids. In: 29th Workshop on Comb. Math, pp. 109\u2013114 (2012)"},{"issue":"7","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T Chen","year":"2011","unstructured":"Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Horng, G., Chen, T., Tsai, D.: Cheating in visual cryptography. Des. Codes Cryptogr. 38(2), 219\u2013236 (2006)","DOI":"10.1007\/s10623-005-6342-0"},{"issue":"5","key":"4_CR4","first-page":"225","volume":"9","author":"MH Ibrahim","year":"2012","unstructured":"Ibrahim, M.H.: New Capabilities of Visual Cryptography. Int J. Comput. Sci. Issues 9(5), 225\u2013231 (2012)","journal-title":"Int J. Comput. Sci. Issues"},{"issue":"6","key":"4_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Image encryption by multiple random grids. Opt. Lett. 12(6), 377\u2013379 (1987)","journal-title":"Opt. Lett."},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10878-009-9241-x","volume":"21","author":"S Lu","year":"2011","unstructured":"Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Comb. Optim. 21(1), 47\u201365 (2011)","journal-title":"J. Comb. Optim."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Mandal, J.K., Ghatak, S.: A Novel Technique for Secret Communication through Optimal Shares using Visual Cryptography (SCOSVC). In: 2011 Symp. on Electron. Syst. Des. 329\u2013334 (2011)","DOI":"10.1109\/ISED.2011.49"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: EUROCRYPT\u201994. pp. 1\u20132 (1994)","DOI":"10.1007\/BFb0053419"},{"key":"4_CR9","unstructured":"Shyu, S.J.:Visual cryptography and random grids. In: Cimato, S., Yang, C. (eds.) Visual Cryptography and Secret Image Sharing, pp. 185\u2013220. Taylor & Francis Group (2012)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Trujillo, A.E., Miyatake, M.N., Iwamoto, M., Meana, H.P.: A cheating prevention EVC scheme using watermarking techniques. Rev. Fac. Ing., Universidad de Antioquia. 30\u201342 (2012)","DOI":"10.17533\/udea.redin.12484"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Hollmann, H.D.L., Van Lint, J.H., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Cryptogr. 37(1), 169\u2013186 (2005)","DOI":"10.1007\/s10623-004-3816-4"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Ulichney, R.: The void-and-cluster method for dither array generation. In: IS&T\/SPIE Symposium on Electron. Imaging and Science, vol. 1913, pp. 332\u2013343 (1993)","DOI":"10.1117\/12.152707"},{"issue":"5","key":"4_CR13","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5), 977\u2013995 (2013)","journal-title":"Signal Process."},{"issue":"4","key":"4_CR14","first-page":"317","volume":"9","author":"C Yang","year":"2011","unstructured":"Yang, C., Wu, C., Liu, F.: Construction of general (k, n) probabilistic visual cryptography scheme. J. Electron. Sci. Technol. 9(4), 317\u2013324 (2011)","journal-title":"J. Electron. Sci. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Third International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1771-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T19:11:31Z","timestamp":1716577891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1771-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132217701","9788132217718"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1771-8_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"4 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}