{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:03:05Z","timestamp":1743094985397,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_17","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"181-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels"],"prefix":"10.1007","author":[{"given":"T. E.","family":"Jisha","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Monoth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. Advances in Cryptology-Eurocrypt\u201994, LNCS 950, pp. 1\u201312 (1995)","DOI":"10.1007\/BFb0053419"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Pandey, D., Kumar, A., Singh, Y.: Feature and Future of Visual Cryptography Based Schemes,\u00a0Quality, Reliability, Security and Robustness in Heterogeneous Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 816\u2013830. Springer (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-37949-9_71","DOI":"10.1007\/978-3-642-37949-9_71"},{"key":"17_CR3","unstructured":"Monoth, T., Babu Anto, P.: Analysis and Design of Tamperproof and Contrast-Enhanced Secret Sharing Based on Visual Cryptography Schemes, Ph.D. thesis, Kannur University, Kerala, India (2012). \nhttp:\/\/shodhganga.inflibnet.ac.in"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) Automata, Languages and Programming. ICALP 1996. Lecture Notes in Computer Science, Vol. 1099. Springer, Berlin (1996)","DOI":"10.1007\/3-540-61440-0_147"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.A.: Comprehensive study of visual cryptography. In: Shi, Y.Q. (eds.) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol. 6010. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14298-7_5"},{"key":"17_CR6","unstructured":"Jisha, T.E., Monoth, T.: Research advances in black and white visual cryptography schemes. Int. J. Adv. Intell. Syst. Comput. (2019). \nhttp:\/\/www.springer.com\/series\/11156\n\n. (Accepted)"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Lin, T.H., Shiao, N.S., Chen, H.H., Tsai, C.S.: A new non-expansion visual cryptography scheme with high quality of recovered image. In: IET International Conference on Frontier Computing. Theory, Technologies and Applications. IEEE Xplore (2010) \nhttps:\/\/doi.org\/10.1049\/cp.2010.0571","DOI":"10.1049\/cp.2010.0571"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Huang, Y.-J., Chang, J.-D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE). IEEE (2013). \nhttps:\/\/doi.org\/10.1109\/isne.2013.6512319","DOI":"10.1109\/isne.2013.6512319"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chow, Y.W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Information and Communications Security. Lecture Notes in Computer Science, vol. 7618. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34129-8_2"},{"key":"17_CR10","unstructured":"Ito, R., Kuwakado, H., Thanka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82-A(10) (1999)"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331\u2013342 (2012). \nhttps:\/\/doi.org\/10.1016\/j.jvcir.2011.11.003\n\n. (Elsevier)","DOI":"10.1016\/j.jvcir.2011.11.003"},{"issue":"21","key":"17_CR12","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","volume":"177","author":"Y-F Chen","year":"2007","unstructured":"Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696\u20134710 (2007)","journal-title":"Inf. Sci."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"11157","DOI":"10.1007\/s11042-015-2838-4","volume":"75","author":"B Yan","year":"2016","unstructured":"Yan, B., Wang, Y.F., Song, L.Y., et al.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimedia Tools Appl. 75, 11157 (2016). \nhttps:\/\/doi.org\/10.1007\/s11042-015-2838-4","journal-title":"Multimedia Tools Appl."},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images. An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 28(2) (2019). \nhttps:\/\/doi.org\/10.1109\/tip.2018.2874378","DOI":"10.1109\/tip.2018.2874378"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Yan, B., Wang, Y.-F., Song, L.-Y., Yang, H.-M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimedia Tools Appl. 75(18), 11157\u201311180 (2016) \nhttps:\/\/doi.org\/10.1007\/s11042-015-2838-4","DOI":"10.1007\/s11042-015-2838-4"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"D Ou","year":"2015","unstructured":"Ou, D., Sun, W., Xiaotian, W.: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig. Process. 108, 604\u2013621 (2015). \nhttps:\/\/doi.org\/10.1016\/j.sigpro.2014.10.011\n\n. (Elsevier)","journal-title":"Sig. Process."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Sharma, R., Agrawal, N.K., Khare, A., Pal, A.K.: An improved size invariant (n, n) extended visual cryptography scheme. Int. J. Bus. Data Commun. Netw. 12(2) (2016)","DOI":"10.4018\/IJBDCN.2016070105"},{"key":"17_CR18","doi-asserted-by":"publisher","unstructured":"Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: 10th International Conference on Information Technology (ICIT 2007), Orissa, IEEE Xplore (2007), pp. 41\u201343. \nhttps:\/\/doi.org\/10.1109\/icit.2007.32","DOI":"10.1109\/icit.2007.32"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Monoth, T., Babu Anto, P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. In: Computational Intelligence, Cyber Security and Computational Models, Advances in Intelligent Systems and Computing, vol. 412, pp. 361\u2013368. Springer, Singapore (2016)","DOI":"10.1007\/978-981-10-0251-9_34"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Monoth, T.: Contrast-enhanced recursive visual cryptography scheme based on additional basis matrices. In: Satapathy, S., Bhateja, V., Das, S. (eds.) Smart Intelligent Computing and Applications. Smart Innovation, Systems and Technologies, vol. 105. Springer, Singapore (2019)","DOI":"10.1007\/978-981-13-1927-3_18"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Mohan, A., Binu, V.P.: Quality improvement in Color Extended Visual Cryptography using ABM and PRWP. In: International Conference on Data Mining and Advanced Computing (SAPIENCE). IEEE Xplore (2016). \nhttps:\/\/doi.org\/10.1109\/sapience.2016.7684159","DOI":"10.1109\/sapience.2016.7684159"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:05:26Z","timestamp":1599552326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}