{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:17:38Z","timestamp":1774678658655,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,9,27]],"date-time":"2009-09-27T00:00:00Z","timestamp":1254009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s10623-009-9327-6","type":"journal-article","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T07:19:42Z","timestamp":1253949582000},"page":"19-35","source":"Crossref","is-referenced-by-count":42,"title":["Optimal (k, n) visual cryptographic schemes for general k"],"prefix":"10.1007","volume":"55","author":[{"given":"Mausumi","family":"Bose","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Mukerjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,27]]},"reference":[{"key":"9327_CR1","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1093\/ietfec\/e90-a.5.949","volume":"E90-A","author":"A. Adhikari","year":"2007","unstructured":"Adhikari A., Bose M., Kumar D., Roy B.: Applications of partially balanced incomplete block designs in developing (2, n) visual cryptographic schemes. IEICE Trans. Fund. E90-A, 949\u2013951 (2007)","journal-title":"IEICE Trans. Fund."},{"key":"9327_CR2","unstructured":"Ateniese G., Blundo C., De Santis A., Stinson D.R.: Constructions and bounds for visual cryptography. In: ICALP 1996, pp. 416\u2013428. Springer-Verlag, Berlin (1996)."},{"key":"9327_CR3","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo C., De Santis A., Stinson D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12, 261\u2013289 (1999)","journal-title":"J. Cryptol."},{"key":"9327_CR4","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/S0020-0190(00)00108-3","volume":"75","author":"C. Blundo","year":"2001","unstructured":"Blundo C., De Santis A., Naor M.: Visual cryptography for grey-level images. Inf. Process. Lett. 75, 255\u2013259 (2001)","journal-title":"Inf. Process. Lett."},{"key":"9327_CR5","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C. Blundo","year":"2003","unstructured":"Blundo C., D\u2019Arco P., De Santis A., Stinson D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16, 224\u2013261 (2003)","journal-title":"SIAM J. Discrete Math."},{"key":"9327_CR6","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s10623-006-0011-9","volume":"40","author":"M. Bose","year":"2006","unstructured":"Bose M., Mukerjee R.: Optimal (2, n)visual cryptographic schemes. Des. Codes Crypt. 40, 255\u2013267 (2006)","journal-title":"Des. Codes Crypt."},{"key":"9327_CR7","unstructured":"Clatworthy W.H.: Tables of Two-Associate Partially Balanced Designs. National Bureau of Standards, Washington, DC (1973)."},{"key":"9327_CR8","doi-asserted-by":"crossref","unstructured":"Dodge Y.: Statistical Data Analysis Based on the L1-Norm and Related Methods. Birkhauser, Basel (2002).","DOI":"10.1007\/978-3-0348-8201-9"},{"key":"9327_CR9","unstructured":"Droste S.: New Results on Visual Cryptography. In: CRYPTO 1996, pp. 401\u2013415. Springer-Verlag, Berlin (1999)."},{"key":"9327_CR10","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister T., Krause M., Simon H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240, 471\u2013485 (2000)","journal-title":"Theor. Comput. Sci."},{"key":"9327_CR11","first-page":"158","volume":"E85-A","author":"T. Ishihara","year":"2002","unstructured":"Ishihara T., Koga H.: New constructions of the lattice-based visual secret sharing using mixture of colors. IEICE Trans. Fund. E85-A, 158\u2013166 (2002)","journal-title":"IEICE Trans. Fund."},{"key":"9327_CR12","doi-asserted-by":"crossref","unstructured":"Iwamoto M.: Weakly secure visual secret sharing schemes. In: Proc. ISITA 2008, pp. 42\u201347. Auckland (2008).","DOI":"10.1109\/ISITA.2008.4895380"},{"key":"9327_CR13","doi-asserted-by":"crossref","unstructured":"Koga H., Ueda E.: Proposal of an asymptotically contrast-ideal (t, n)-threshold visual secret sharing scheme. In: Proc. ISIT 2006, pp. 912\u2013916. Seattle, (2006a).","DOI":"10.1109\/ISIT.2006.261792"},{"key":"9327_CR14","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10623-005-6700-y","volume":"40","author":"H. Koga","year":"2006","unstructured":"Koga H., Ueda E.: Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des. Codes Crypt. 40, 81\u2013102 (2006b)","journal-title":"Des. Codes Crypt."},{"key":"9327_CR15","first-page":"262","volume":"E84-A","author":"H. Koga","year":"2001","unstructured":"Koga H., Iwamoto M., Yamamoto H.: An analytic construction of visual secret sharing scheme for color images. IEICE Trans. Fund. E84-A, 262\u2013272 (2001)","journal-title":"IEICE Trans. Fund."},{"key":"9327_CR16","volume-title":"A Modern Theory of Factorial Designs","author":"R. Mukerjee","year":"2006","unstructured":"Mukerjee R., Wu C.F.J.: A Modern Theory of Factorial Designs. Springer-Verlag, Berlin (2006)"},{"key":"9327_CR17","doi-asserted-by":"crossref","unstructured":"Naor M., Shamir A.: Visual Cryptography. In: Eurocrypt 1994. pp. 1\u201312. Springer-Verlag, Berlin (1994).","DOI":"10.1007\/BFb0053419"},{"key":"9327_CR18","volume-title":"Constructions and Combinatorial Problems in Design of Experiments","author":"D. Raghavarao","year":"1971","unstructured":"Raghavarao D.: Constructions and Combinatorial Problems in Design of Experiments. Wiley, New York (1971)"},{"key":"9327_CR19","doi-asserted-by":"crossref","first-page":"361","DOI":"10.2307\/1401745","volume":"30","author":"K. Takeuchi","year":"1962","unstructured":"Takeuchi K.: A table of difference sets generating balanced incomplete block designs. Rev. Internat. Statist. Inst. 30, 361\u2013366 (1962)","journal-title":"Rev. Internat. Statist. Inst."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9327-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9327-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9327-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:26Z","timestamp":1559246306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9327-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,27]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["9327"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9327-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,27]]}}}