{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:54:35Z","timestamp":1742972075881,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_17","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"179-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Recursive Visual Cryptography Scheme with PRWP and Additional Basis Matrix"],"prefix":"10.1007","author":[{"given":"T. E.","family":"Jisha","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Monoth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (Ed.) Advances in Cryptology\u2014EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053419","DOI":"10.1007\/BFb0053419"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Pandey, D., Kumar, A., Singh, Y.: Feature and future of visual cryptography based schemes. In: Singh, K., Awasthi, A.K. (Eds.) QShine 2013. LNICST, vol. 115, pp. 816\u2013830. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37949-9_71","DOI":"10.1007\/978-3-642-37949-9_71"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Monoth, T., Babu, A.P.: Recursive visual cryptography using random basis column pixel expansion. In: 10th International Conference on Information Technology (ICIT 2007), Orissa, 2007, pp. 41\u201343. IEEE\u00a0Xplore. https:\/\/doi.org\/10.1109\/ICIT.2007.32","DOI":"10.1109\/ICIT.2007.32"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Monoth, T.: Contrast-enhanced recursive visual cryptography scheme based on additional basis matrices. In: Smart Intelligent Computing and Applications, vol. 105, pp.179\u2013187. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-1927-3_18","DOI":"10.1007\/978-981-13-1927-3_18"},{"key":"17_CR5","unstructured":"Monoth, T., Babu Anto, P.: Analysis and design of tamperproof and contrast-enhanced secret sharing based on visual cryptography schemes, Ph. D. thesis, Kannur University, Kerala, India (2012). http:\/\/shodhganga.inflibnet.ac.in"},{"key":"17_CR6","doi-asserted-by":"publisher","unstructured":"Ateniese G., Blundo C., De Santis A., Stinson D.R.: Constructions and bounds for visual cryptography. In: Meyer F., Monien B. (Eds.) Automata, Languages and Programming. ICALP 1996. Lecture Notes in Computer Science, vol. 1099, pp. 416\u2013428. Springer, Berlin, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61440-0_147","DOI":"10.1007\/3-540-61440-0_147"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Weir, J., Yan, W.A.: Comprehensive study of visual cryptography. In: Shi Y.Q. (Eds.) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol. 6010, pp. 70\u2013105. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14298-7_5","DOI":"10.1007\/978-3-642-14298-7_5"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Jisha, T.E., Monoth, T.: Recent research advances in black and white visual cryptography schemes, soft computing for problem solving. In: Advances in Intelligent Systems and Computing, vol. 1048, pp. 479\u2013492. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0035-0_38","DOI":"10.1007\/978-981-15-0035-0_38"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Chavan, P.V., Atique, M.: Secured approach for authentication using threshold-based hierarchical visual cryptography. Int. J. Inf. Privacy Secur. Integr. 2(2), 159\u2013175(2015). https:\/\/doi.org\/10.1504\/IJIPSI.2015.075440","DOI":"10.1504\/IJIPSI.2015.075440"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Monoth, T., Babu Anto, P.: Contrast-enhanced visual cryptography schemes based on perfect reconstruction of white pixels and additional basis matrix. Computational intelligence, cyber security and computational models. In: Advances in Intelligent Systems and Computing, vol. 412. pp. 361\u2013368. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-0251-9_34","DOI":"10.1007\/978-981-10-0251-9_34"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Jisha, T.E., Monoth, T.: Optimal contrast and size-invariant recursive VCS using perfect reconstruction of white pixels. Evolution in Computational Intelligence. In: Advances in Intelligent Systems and Computing, vol. 1176, pp. 181\u2013189. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5788-0_17","DOI":"10.1007\/978-981-15-5788-0_17"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Jisha, T.E., Monoth, T.: WiP: Security enhanced size invariant visual cryptography with perfect reconstruction of white pixels. In: ICISS 2019, LNCS 11952, pp. 279\u2013289, Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-36945-3_15","DOI":"10.1007\/978-3-030-36945-3_15"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Lin, T.H., Shiao, N.S., Chen, H.H., Tsai, C.S.: A new non-expansion visual cryptography scheme with high quality of recovered image. In: IET International Conference on Frontier Computing. Theory, Technologies and Applications. IEEE\u00a0Xplore (2010) https:\/\/doi.org\/10.1049\/cp.2010.0571","DOI":"10.1049\/cp.2010.0571"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Huang, Y.-J., Chang, J.-D.: Non-expanded visual cryptography scheme with authentication. In: IEEE 2nd International Symposium on Next-Generation Electronics (ISNE)\u2014IEEE (2013). https:\/\/doi.org\/10.1109\/ISNE.2013.6512319","DOI":"10.1109\/ISNE.2013.6512319"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Chow, Y.W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. Information and Communications Security. Lecture Notes in Computer Science, vol. 7618. Springer, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-34129-8_2"},{"key":"17_CR16","unstructured":"Ito, R., Kuwakado, H., Thanka, H.: Image size invariant visual cryptography. IEICE Trans. Fund. E82-A(10) (1999)"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Liu, F., Guo, T., Wu, C.K., Qian, L.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent 23(2), 331\u2013342 (2012). Elsevier. https:\/\/doi.org\/10.1016\/j.jvcir.2011.11.003","DOI":"10.1016\/j.jvcir.2011.11.003"},{"issue":"21","key":"17_CR18","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","volume":"177","author":"Y-F Chen","year":"2007","unstructured":"Chen, Y.-F., Chan, Y.-K., Huang, C.-C., Tsai, M.-H., Chu, Y.-P.: A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21), 4696\u20134710 (2007)","journal-title":"Inf. Sci."},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Mohan, A., Binu, V.P.: Quality improvement in color extended visual cryptography using ABM and PRWP. In: International Conference on Data Mining and Advanced Computing (SAPIENCE)ss. IEEE\u00a0Xplore, (2016). https:\/\/doi.org\/10.1109\/SAPIENCE.2016.7684159","DOI":"10.1109\/SAPIENCE.2016.7684159"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"11157","DOI":"10.1007\/s11042-015-2838-4","volume":"75","author":"B Yan","year":"2016","unstructured":"Yan, B., Wang, Y.F., Song, L.Y., et al.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75, 11157 (2016). https:\/\/doi.org\/10.1007\/s11042-015-2838-4","journal-title":"Multimed. Tools Appl."},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images. An Analysis-by-Synthesis (AbS) approach. IEEE Trans. Image Process. 28(2). https:\/\/doi.org\/10.1109\/TIP.2018.2874378","DOI":"10.1109\/TIP.2018.2874378"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Yan, B., Wang, Y.-F., Song, L.-Y., Yang, H.-M.: Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multimed. Tools Appl. 75(18), 11157\u201311180 (2016). https:\/\/doi.org\/10.1007\/s11042-015-2838-4","DOI":"10.1007\/s11042-015-2838-4"},{"key":"17_CR23","doi-asserted-by":"publisher","unstructured":"Ou., Duanhao, Sun, W., Wu., Xiaotian: Non-expansible XOR-based visual cryptography scheme with meaningful shares. Signal Process. 108, 604\u2013621 (2015). https:\/\/doi.org\/10.1016\/j.sigpro.2014.10.011(Elsevier)","DOI":"10.1016\/j.sigpro.2014.10.011(Elsevier)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Sharma, R., Agrawal, N.K., Khare, A., Pal, A.K.: An improved size invariant n, n extended visual cryptography scheme. Int. J. Bus. Data Commun. Netw. 12(2) (2016)","DOI":"10.4018\/IJBDCN.2016070105"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:12:04Z","timestamp":1650715924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_17","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}