{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:16Z","timestamp":1725881536121},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_46","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T02:13:45Z","timestamp":1488420825000},"page":"447-455","source":"Crossref","is-referenced-by-count":0,"title":["Design of Visual Cryptography Scheme Using C(m, w) Combinations"],"prefix":"10.1007","author":[{"given":"Anindya Kr.","family":"Biswas","sequence":"first","affiliation":[]},{"given":"S.","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"M. Naor, A. Shamir, Visual cryptography, in Proceedings of Eurocrypt 94, LNCS 950 (Springer, 1994), pp. 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"J. Daemen, V. Rijmen, Rijndael: the advanced encryption standard. Fr. Dobb\u2019s J. (2001)","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Boldyreva, S. Micali, Public-key encryption in multiuser setting: security proofs and improvements, in Advances in Cryptology-Eurocrypt-2000 (2000)","DOI":"10.1007\/3-540-45539-6_18"},{"key":"46_CR4","unstructured":"Cox et al., Digital Water Marking (Morgan Kaufmann Publishers, 2000)"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Visual cryptography for general access structure. J. Inf. Comput. 129(2), 86\u2013106 (1996)","DOI":"10.1006\/inco.1996.0076"},{"key":"46_CR6","first-page":"707","volume":"27","author":"WG Tzeng","year":"2002","unstructured":"W.G. Tzeng, C.M. Hu, A new approach for visual cryptography. J Des. Codes Crypt. 27, 707\u2013727 (2002)","journal-title":"J Des. Codes Crypt."},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Hofmeister et al., Contrast-Optimal k-out-of-n Secret Sharing Schemes in Visual cryptograph COCOON 97, LNCS, vol. 1276 (1997)","DOI":"10.1007\/BFb0045084"},{"key":"46_CR8","unstructured":"S. Droste, New results on visual cryptography, in Proceedings of Advances in Cryptology-CRYPTO 96, LNCS, vol. 1109 (1996), pp. 401\u2013415"},{"key":"46_CR9","unstructured":"K. Kim et al., Human-machine identification using visual cryptography, in Proceedings of IEEE International Workshop on Intelligent Signal Processing and Communication Systems (1998), pp. 178\u2013182"},{"key":"46_CR10","unstructured":"D. Naccache, Colorful cryptography\u2014a purely physical secret-sharing scheme based on chromatic filters, in Coding and Information Integrity, French-Israeli Workshop (1994)"},{"key":"46_CR11","unstructured":"V. Rijmen, B. Preneel, Efficient colour visual encryption or shared colors of Benetton, in UROCRYPT 96 (1996)"},{"key":"46_CR12","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"YC Hou","year":"2003","unstructured":"Y.C. Hou, Visual cryptography for color images. Pattern Recognit. 36, 1619\u20131629 (2003)","journal-title":"Pattern Recognit."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T03:01:35Z","timestamp":1568862095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_46","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}