{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:34:44Z","timestamp":1762004084293},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,7,10]],"date-time":"2008-07-10T00:00:00Z","timestamp":1215648000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s10623-008-9225-3","type":"journal-article","created":{"date-parts":[[2008,7,9]],"date-time":"2008-07-09T11:34:11Z","timestamp":1215603251000},"page":"215-227","source":"Crossref","is-referenced-by-count":35,"title":["The alignment problem of visual cryptography schemes"],"prefix":"10.1007","volume":"50","author":[{"given":"Feng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chuan Kun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xi Jun","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,7,10]]},"reference":[{"key":"9225_CR1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese G., Blundo C., Santis A.D., Stinson D.R.: Visual cryptography for general access structures. Inform. Computat. 129, 86\u2013106 (1996)","journal-title":"Inform. Computat."},{"issue":"1\u20132","key":"9225_CR2","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese G., Blundo C., Santis A.D., Stinson D.R.: Extended capabilities for visual cryptography. ACM Theor. Comput. Sci. 250(1\u20132), 143\u2013161 (2001)","journal-title":"ACM Theor. Comput. Sci."},{"key":"9225_CR3","unstructured":"Biham E., Itzkovitz A.: Visual cryptography with polarization. In: The Dagstuhl Seminar on Cryptography, September 1997, and in the RUMP session of CRYPTO \u201998 (1997)."},{"issue":"1","key":"9225_CR4","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S. Cimato","year":"2006","unstructured":"Cimato S., Prisco R.D., Santis A.D.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97\u2013107 (2006)","journal-title":"Comput. J."},{"key":"9225_CR5","doi-asserted-by":"crossref","unstructured":"Droste S.: New results on visual cryptography. In: CRYPTO \u201996. LNCS, vol. 1109, pp. 401\u2013415. Springer-Verlag (1996).","DOI":"10.1007\/3-540-68697-5_30"},{"key":"9225_CR6","doi-asserted-by":"crossref","unstructured":"Kobara K., Imai H.: Limiting the visible space visual secret sharing schemes and their application to human identification. In: ASIACRYPT \u201996. LNCS, vol. 1163, pp. 185\u2013195. Springer-Verlag (1996).","DOI":"10.1007\/BFb0034846"},{"issue":"5","key":"9225_CR7","first-page":"1193","volume":"E87-A","author":"H. Kuwakado","year":"2004","unstructured":"Kuwakado H., Tanaka H.: Size-reduced visual secret sharing scheme. IEICE Trans. Fundam E87-A(5), 1193\u20131197 (2004)","journal-title":"IEICE Trans. Fundam"},{"issue":"10","key":"9225_CR8","first-page":"2172","volume":"E82-A","author":"R. Ito","year":"1999","unstructured":"Ito R., Kuwakado H., Tanaka H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Elect. Commun. Comput. Sci. E82-A(10), 2172\u20132177 (1999)","journal-title":"IEICE Trans. Fundam. Elect. Commun. Comput. Sci."},{"key":"9225_CR9","unstructured":"Naor M., Shamir A.: Visual cryptography. In: EUROCRYPT \u201994. LNCS, vol. 950, pp. 1\u201312. Springer-Verlag (1995)."},{"key":"9225_CR10","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"S.J. Shyu","year":"2006","unstructured":"Shyu S.J.: Efficient visual secret sharing scheme for color images. Patt. Recogn. 39, 866\u2013880 (2006)","journal-title":"Patt. Recogn."},{"key":"9225_CR11","unstructured":"Yan W.Q., Jin D., Kankanhalli M.S.: Visual cryptography for print and scan applications. In: Proceedings of the 2004 International Symposium on Circuits and Systems, vol. 5, pp. 572\u2013575 (2004)."},{"key":"9225_CR12","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C.N. Yang","year":"2004","unstructured":"Yang C.N.: New visual secret sharing schemes using probabilistic method. Patt. Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Patt. Recogn. Lett."},{"key":"9225_CR13","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C.N. Yang","year":"2000","unstructured":"Yang C.N., Laih C.S.: New colored visual secret sharing schemes. Des. Codes Cryptogr. 20, 325\u2013335 (2000)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9225-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9225-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9225-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:50:10Z","timestamp":1559231410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9225-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,10]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["9225"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9225-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,7,10]]}}}