{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:36:18Z","timestamp":1725910578937},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063848"},{"type":"electronic","value":"9789811063855"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6385-5_28","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T14:03:52Z","timestamp":1505484232000},"page":"331-340","source":"Crossref","is-referenced-by-count":1,"title":["A General (k,\u00a0n) Threshold Secret Image Sharing Construction Based on Matrix Theory"],"prefix":"10.1007","author":[{"given":"Wanmeng","family":"Ding","sequence":"first","affiliation":[]},{"given":"Kesheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Lintao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"issue":"11","key":"28_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"5","key":"28_CR2","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien, C.C., Lin, J.C.: How to share a secret. Comput. Graph. 26(5), 765\u2013770 (2002)","journal-title":"Comput. Graph."},{"issue":"12","key":"28_CR3","doi-asserted-by":"crossref","first-page":"3652","DOI":"10.1016\/j.patcog.2007.04.001","volume":"40","author":"SJ Lin","year":"2007","unstructured":"Lin, S.J., Lin, J.C.: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40(12), 3652\u20133666 (2007)","journal-title":"Pattern Recogn."},{"issue":"12","key":"28_CR4","doi-asserted-by":"crossref","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","volume":"28","author":"CN Yang","year":"2010","unstructured":"Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600\u20131610 (2010)","journal-title":"Image Vis. Comput."},{"issue":"7","key":"28_CR5","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.jvcir.2013.07.005","volume":"24","author":"P Li","year":"2013","unstructured":"Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 24(7), 1106\u20131114 (2013)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"28_CR6","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383\u2013396 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology\u2014EUROCRYPT 1994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi:\n10.1007\/BFb0053419"},{"key":"28_CR8","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.sigpro.2014.06.011","volume":"105","author":"X Yan","year":"2014","unstructured":"Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Sig. Process. 105, 389\u2013398 (2014)","journal-title":"Sig. Process."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6385-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T14:11:08Z","timestamp":1505484668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6385-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063848","9789811063855"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6385-5_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}