{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:28:39Z","timestamp":1773962919649,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811500343","type":"print"},{"value":"9789811500350","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0035-0_38","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T12:04:06Z","timestamp":1574856246000},"page":"479-492","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Recent Research Advances in Black and White Visual Cryptography Schemes"],"prefix":"10.1007","author":[{"given":"T. E.","family":"Jisha","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Monoth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"38_CR1","first-page":"1","volume":"950","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography, advances in cryptology-eurocrypt\u201994. LNCS 950, 1\u201312 (1995)","journal-title":"LNCS"},{"key":"38_CR2","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1007\/978-3-642-37949-9_71","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"Dhiraj Pandey","year":"2013","unstructured":"Pandey, D., Kumar, A., Singh, Y.: Feature and future of visual cryptography based schemes. In: Quality, Reliability, Security and Robustness in Heterogeneous Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 816\u2013830. Springer, Berlin (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-37949-9_71"},{"key":"38_CR3","unstructured":"Monoth, T., Babu Anto P, \u201cAnalysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes, Ph.D Thesis, Kannur University, Kerala, India, (2012). (http:\/\/ shodhganga.inflibnet.ac.in)"},{"issue":"1-3","key":"38_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"Carlo Blundo","year":"2006","unstructured":"Blundo, C., Cimatob, S., De Santisa, A.: Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3), 169\u2013182 (2006), (Elsevier) (\nhttps:\/\/doi.org\/10.1016\/j.tcs.2006.08.008\n\n)","journal-title":"Theoretical Computer Science"},{"key":"38_CR5","unstructured":"Ito, R., Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A, 10 (1999)"},{"issue":"3","key":"38_CR6","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1019939020426","volume":"27","author":"Wen-Guey Tzeng","year":"2002","unstructured":"Tzeng, W.G., Hu, C.M.: A new approach for visual cryptography. Des. Codes Cryptogr. 27(3),\u00a0207\u2013227 (2002). \nhttps:\/\/doi.org\/10.1023\/A:1019939020426","journal-title":"Designs, Codes and Cryptography"},{"issue":"4","key":"38_CR7","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"Ching-Nung Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481\u2013494 (2004), (Elsevier)","journal-title":"Pattern Recognition Letters"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"Carlo Blundo","year":"2006","unstructured":"Blundo, Carlo, Cimato, Stelvio, De Santis, Alfredo: Visual cryptography schemes with optimal pixel expansion. Theoret. Comput. Sci. 369, 169\u2013182 (2006). \nhttps:\/\/doi.org\/10.1016\/j.tcs.2006.08.008\n\n. (Elsevier)","journal-title":"Theoret. Comput. Sci."},{"issue":"5","key":"38_CR9","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.ic.2006.12.005","volume":"205","author":"Andreas Klein","year":"2007","unstructured":"Klein, A., Wessler, M.: Extended visual cryptography schemes. Inf. Comput. 205(5),\u00a0716\u2013732 (2007). \nhttps:\/\/doi.org\/10.1016\/j.ic.2006.12.005\n\n. (Elsevier)","journal-title":"Information and Computation"},{"issue":"6","key":"38_CR10","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.dam.2009.12.005","volume":"158","author":"Hossein Hajiabolhassan","year":"2010","unstructured":"Hajiabolhassan, Hossein, Cheraghi, Abbas: Bounds for visual cryptography schemes. Discret. Appl. Math. 158(6), 659\u2013665 (2010). \nhttps:\/\/doi.org\/10.1016\/j.dam.2009.12.005\n\n. (Elsevier)","journal-title":"Discret. Appl. Math."},{"issue":"7","key":"38_CR11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ipl.2010.01.003","volume":"110","author":"Feng Liu","year":"2010","unstructured":"Liu, Feng, ChuanKun, Wu, Lin, XiJun: A new definition of the contrast of visual cryptography scheme. Inf. Process. Lett. 110(7), 241\u2013246 (2010). \nhttps:\/\/doi.org\/10.1016\/j.ipl.2010.01.003\n\n. (Elsevier)","journal-title":"Inf. Process. Lett."},{"issue":"12","key":"38_CR12","doi-asserted-by":"publisher","first-page":"2730","DOI":"10.1016\/j.optcom.2011.01.077","volume":"284","author":"Kai-Hui Lee","year":"2011","unstructured":"Lee, Kai-Hui, Chiu, Pei-Ling: A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images. Opt. Commun. 284(12), 2730\u20132741 (2011). \nhttps:\/\/doi.org\/10.1016\/j.optcom.2011.01.077\n\n. (Elsevier)","journal-title":"Opt. Commun."},{"issue":"2","key":"38_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"Feng Liu","year":"2012","unstructured":"Liu, Feng, guo, Teng, Wu, ChuanKun, Qian, Lina: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331\u2013342 (2012). \nhttps:\/\/doi.org\/10.1016\/j.jvcir.2011.11.003\n\n. (Elsevier)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"6","key":"38_CR14","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.optlaseng.2012.01.013","volume":"50","author":"Vilma Petrauskiene","year":"2012","unstructured":"Petrauskiene, V., Aleksa, A., Fedaravicius, A., Ragulskis, M.: Dynamic visual cryptography for optical control of vibration generation equipment. Opt. Lasers Eng. 50, 869\u2013876 (2012) (Elsevier)","journal-title":"Optics and Lasers in Engineering"},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.sigpro.2014.06.011","volume":"105","author":"Xuehu Yan","year":"2014","unstructured":"Yan, Xuehu, Wang, Shen, Niu, Xiamu: Threshold construction from specific cases in visual cryptography without the pixel expansion. Sig. Process. 105, 389\u2013398 (2014). \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2014.06.011\n\n. (Elsevier)","journal-title":"Sig. Process."},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jss.2014.03.079","volume":"95","author":"P D\u2019Arco","year":"2014","unstructured":"D\u2019Arco, P., De Prisco, R., De Santis, A.: Measure-independent characterization of contrast optimal visual cryptography schemes. J. Syst. Softw. 95, 89\u201399 (2014). \nhttps:\/\/doi.org\/10.1016\/j.jss.2014.03.079\n\n. (Elsevier)","journal-title":"J. Syst. Softw."},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.sigpro.2014.09.032","volume":"108","author":"Pei-Ling Chiu","year":"2015","unstructured":"Chiu, Pei-Ling, Lee, Kai-Hui: User-friendly threshold visual cryptography with complementary cover images. Sig. Process. 108, 476\u2013488 (2015). \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2014.09.032\n\n. (Elsevier)","journal-title":"Sig. Process."},{"key":"38_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.dsp.2015.02.012","volume":"40","author":"Jung-San Lee","year":"2015","unstructured":"Lee, Jung-San, Chang, Chin-Chen, Huynh, Ngoc-Tu, Tsai, Hsin-Yi: Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Digit. Signal Proc. 40, 131\u2013139 (2015). \nhttps:\/\/doi.org\/10.1016\/j.dsp.2015.02.012\n\n. (Elsevier)","journal-title":"Digit. Signal Proc."},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"Ou Duanhao","year":"2015","unstructured":"Duanhao, Ou, Sun, Wei, Xiaotian, Wu: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604\u2013621 (2015). \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2014.10.011\n\n. (Elsevier)","journal-title":"Sig. Process."},{"key":"38_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.optcom.2014.09.041","volume":"335","author":"Paulius Palevicius","year":"2015","unstructured":"Palevicius, Paulius, Ragulskis, Minvydas: Image communication scheme based on dynamic visual cryptography and computer generated holography. Opt. Commun. 335, 161\u2013167 (2015). \nhttps:\/\/doi.org\/10.1016\/j.optcom.2014.09.041\n\n. (Elsevier)","journal-title":"Opt. Commun."},{"key":"38_CR21","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1016\/j.procs.2016.02.110","volume":"78","author":"Hinal M. Mudia","year":"2016","unstructured":"Miss, H.M., Miss, P.V.: Fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme. Procedia Comput. Sci. 78, 632\u2013639. (2016). \nhttps:\/\/doi.org\/10.1016\/j.procs.2016.02.110\n\n (Elsevier)","journal-title":"Procedia Computer Science"},{"key":"38_CR22","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.procs.2016.07.288","volume":"93","author":"Mahmoud E Hodeish","year":"2016","unstructured":"Hodeish, Mahmoud E., Bukauskas, Linas, Humbe, Vikas T.: An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput. Sci. 93, 760\u2013767 (2016). \nhttps:\/\/doi.org\/10.1016\/j.procs.2016.07.288\n\n. (Elsevier)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"38_CR23","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10623-016-0181-z","volume":"82","author":"R Lakshmanan","year":"2017","unstructured":"Lakshmanan, R., Arumugam, S.: Des. Codes Cryptogr. 82(3), 629\u2013645 (2017). \nhttps:\/\/doi.org\/10.1007\/s10623-016-0181-z\n\n. (Springer)","journal-title":"Des. Codes Cryptogr."},{"key":"38_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.06.015","author":"Priyanka Singh","year":"2017","unstructured":"Singh, Priyanka, Raman, Balasubramanian, Misra, Manoj: A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Sig. Process. (2017). \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2017.06.015","journal-title":"Sig. Process."},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.jvcir.2017.06.012","volume":"48","author":"Ching-Nung Yang","year":"2017","unstructured":"Yang, Ching-Nung, Xiaotian, Wu, Chou, Yung-Chien, Zhangjie, Fu: Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48, 182\u2013194 (2017). \nhttps:\/\/doi.org\/10.1016\/j.jvcir.2017.06.012","journal-title":"J. Vis. Commun. Image Represent."},{"key":"38_CR26","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.procs.2018.04.172","volume":"131","author":"Teng Guo","year":"2018","unstructured":"Guo, Teng, Zhou, LinNa: Constructing visual cryptography scheme by hypergraph decomposition. Procedia Comput. Sci. 131, 336\u2013343 (2018). \nhttps:\/\/doi.org\/10.1016\/j.procs.2018.04.172\n\n. (Elsevier)","journal-title":"Procedia Comput. Sci."},{"key":"38_CR27","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.procs.2018.04.204","volume":"131","author":"Hao Hua","year":"2018","unstructured":"Hua, Hao, Liu, Yuling, Wang, Yongwei, Chang, Dexian, Leng, Qiang: Visual cryptography based multilevel protection scheme for visualization of network security situation. Procedia Comput. Sci. 131, 204\u2013212 (2018). \nhttps:\/\/doi.org\/10.1016\/j.procs.2018.04.204\n\n. (Elsevier)","journal-title":"Procedia Comput. Sci."},{"issue":"5","key":"38_CR28","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TCSVT.2016.2631404","volume":"28","author":"Xingxing Jia","year":"2018","unstructured":"Jia, X., Wang, D., Nie, D., Zhang, C.: Collaborative visual cryptography schemes. IEEE Trans. Circuits Syst. Video Technol.\u00a028(5), 1056\u20131070 (2018). \nhttps:\/\/doi.org\/10.1109\/tcsvt.2016.2631404\n\n. (IEEE)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"38_CR29","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10044-016-0571-x","volume":"21","author":"S Shivani","year":"2018","unstructured":"Shivani, S., Agarwal, S.: VPVC: verifiable progressive visual cryptography. Pattern Anal Appl. 21(1), 139\u2013166 (2018). \nhttps:\/\/doi.org\/10.1007\/s10044-016-0571-x\n\n. (SpringerLink)","journal-title":"Pattern Anal Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0035-0_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T12:17:11Z","timestamp":1574857031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0035-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9789811500343","9789811500350"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0035-0_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}