{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:24:51Z","timestamp":1747153491779,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811604928"},{"type":"electronic","value":"9789811604935"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-0493-5_14","type":"book-chapter","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T16:27:33Z","timestamp":1613752053000},"page":"152-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Contrast Optimal Visual Cryptography Scheme for Half-Tone Images"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0223-413X","authenticated-orcid":false,"given":"D. R.","family":"Somwanshi","sequence":"first","affiliation":[]},{"given":"Vikas T.","family":"Humbe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,19]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. Eurocrypt (1994)","DOI":"10.1007\/BFb0053419"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y-C Hou","year":"2002","unstructured":"Hou, Y.-C.: Visual cryptography for color images. Pattern Recogn. J. Pattern Recogn. Soc. 36, 1619\u20131629 (2002)","journal-title":"Pattern Recogn. J. Pattern Recogn. Soc."},{"key":"14_CR3","unstructured":"Weir, J., WeiQi, Y.: Visual Cryptography and its Application, Ventus Publishing Aps eBook, pp. 1\u2013144 (2012)"},{"key":"14_CR4","unstructured":"Ecaterina Moraru (Valica), \u201cVisual Cryptography\u201d, Published in:\u00a0Technology,\u00a0Art & Photos on Slide share, pp. 1\u201338 (2008)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone Visual Cryptography. IEEE Trans. Image Process. 15(8), 2241\u20132453, August 2006","DOI":"10.1109\/TIP.2006.875249"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383\u2013396, September 2009","DOI":"10.1109\/TIFS.2009.2024721"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Purushothaman, V., Sreedhar, S.: An improved secret sharing using XOR-based visual cryptography, green engineering and technologies (IC-GET). In: 2016 Online International Conference, November 2016","DOI":"10.1109\/GET.2016.7916633"},{"issue":"3","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.1993625","volume":"14","author":"D Jin","year":"2005","unstructured":"Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imag. 14(3), 1\u201313 (2005)","journal-title":"J. Electron. Imag."},{"issue":"11","key":"14_CR9","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1109\/TCSVT.2011.2106291","volume":"21","author":"Y-C Hou","year":"2011","unstructured":"Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1760\u20131764 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., DeSantis, A., Stinson, D.R.: Visual cryptography for general access structures. In: Proceedings ICAL 1996, pp. 416\u2013428, Springer, Berlin (1996)","DOI":"10.1007\/3-540-61440-0_147"},{"key":"14_CR11","unstructured":"Parakh, A., Kak, S.: A Recursive Threshold Visual Cryptography Scheme. CoRR abs\/0902.2487 (2009)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Lin, C.-C., Tsai, W.-H.: Visual cryptography for gray level images by dithering techniques. Pattern Recogn. Lett. 24(1\u20133) (2003)","DOI":"10.1016\/S0167-8655(02)00259-3"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Verheul, E., Tilborg, H.V.: Constructions and properties of K out of N visual secret sharing schemes. Des. Codes Cryptogr. 11(2), 179\u2013196 (1997)","DOI":"10.1023\/A:1008280705142"},{"issue":"4","key":"14_CR14","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-ifs:20080066","volume":"2","author":"F Liu","year":"2009","unstructured":"Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151\u2013165 (2009)","journal-title":"IET Inf. Secur."},{"key":"14_CR15","unstructured":"Wu, C.C., Chen, L.H.: A Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, Republic of China (1998)"},{"issue":"12","key":"14_CR16","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S.J., Huanga, S.Y., Lee, Y.K., Wang, R.Z., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recogn. 40(12), 3633\u20133651 (2007)","journal-title":"Pattern Recogn."},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Chen, T.-H., Wu, C.-S.: Efficient multi-secret image sharing based on Boolean operations. Sig. Process. 91(1), 90\u201397, January (2011)","DOI":"10.1016\/j.sigpro.2010.06.012"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Roy, S., Venkateswaran, P.: Online payment system using steganography and visual cryptography. In: IEEE Students\u2019 Conference on Electrical, Electronics and Computer Science, pp. 1\u20135 (2014)","DOI":"10.1109\/SCEECS.2014.6804449"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.procs.2015.08.042","volume":"58","author":"AA Rose","year":"2015","unstructured":"Rose, A.A., Thampi, S.M.: A secure verifiable scheme for secret image sharing 2015. Procedia Comput. Sci. 58, 140\u2013150 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"14_CR20","unstructured":"Hodeish, M.E., Bukauska, L., Humbe, V.T.: An optimal (k, n) visual secret sharing scheme for information security. Elsevier-Procedia Comput. Sci. 93, 760\u2013767 (2016)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Rajendra, A.B., Sheshadri, H.S.: Visual Cryptography in Internet Voting System, pp. 60\u201364. IEEE (2013)","DOI":"10.1109\/INTECH.2013.6653684"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-017-4422-6","volume":"77","author":"S Shivani","year":"2017","unstructured":"Shivani, S.: VMVC: Verifiable multi-tone visual cryptography. Multimed Tools Appl. 77, 1\u201320 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4422-6","journal-title":"Multimed Tools Appl."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Hodeish, M.E., Humbe, V.T.: An optimized half tone visual cryptography scheme using error diffusion. Multimed Tools Appl. 1\u201317, Springer, January 2018","DOI":"10.1007\/s11042-018-5724-z"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.eswa.2016.07.003","volume":"63","author":"CY Chen","year":"2016","unstructured":"Chen, C.Y., Chen, C.H., Chen, C.H., Lin, K.P.: An automatic filtering convergence method for iterative impulse noise filters based on PSNR checking and filtered pixels detection. Expert Syst. Appl. 63, 198\u2013207 (2016)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"14_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/CC.2017.7868160","volume":"14","author":"K Shankar","year":"2017","unstructured":"Shankar, K., Eswaran, P.: RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun. 14(2), 118\u2013130 (2017). https:\/\/doi.org\/10.1109\/CC.2017.7868160","journal-title":"China Commun."},{"issue":"3","key":"14_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang, Z., Bovik, A.C.: A universal image quality index. IEEE Signal Process. Lett. 9(3), 81\u201384 (2002)","journal-title":"IEEE Signal Process. Lett."},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i47\/105556","volume":"9","author":"S Rajkumar","year":"2016","unstructured":"Rajkumar, S., Malathi, G.: A comparative analysis on image quality assessment for real time satellite images. Indian J. Sci. Technol. 9, 1\u201311 (2016)","journal-title":"Indian J. Sci. Technol."},{"key":"14_CR28","unstructured":"Ece, C., Mullana, M.M.U.: Image quality assessment techniques in spatial domain. IJCST 2(3) (2011)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Image Processing and Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-0493-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T16:35:10Z","timestamp":1613752510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-16-0493-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811604928","9789811604935"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-0493-5_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RTIP2R","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Recent Trends in Image Processing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aurangabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rtip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.rtip2r-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"329","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}