{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T10:56:44Z","timestamp":1763809004403},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s10623-010-9449-x","type":"journal-article","created":{"date-parts":[[2010,12,31]],"date-time":"2010-12-31T02:46:38Z","timestamp":1293763598000},"page":"223-249","source":"Crossref","is-referenced-by-count":6,"title":["A general method for construction of (t, n)-threshold visual secret sharing schemes for color images"],"prefix":"10.1007","volume":"61","author":[{"given":"Hiroki","family":"Koga","sequence":"first","affiliation":[]},{"given":"Takeru","family":"Ishihara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,1]]},"reference":[{"key":"9449_CR1","unstructured":"Adhikari A., Sikdar S.: A new (2, n)-visual threshold scheme for color images. In: Progress in Cryptology: INDOCRYPT 2003, LNCS, vol. 2904, pp. 148\u2013161. Springer-Verlag, Heidleberg (2003)."},{"key":"9449_CR2","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/S0020-0190(00)00108-3","volume":"75","author":"C. Blundo","year":"2000","unstructured":"Blundo C., De Santis A., Naor M.: Visual cryptography for grey level images. Inf. Process. Lett. 75, 255\u2013259 (2000)","journal-title":"Inf. Process. Lett."},{"key":"9449_CR3","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo C., De Bonis A., De Santis A.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24, 255\u2013278 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"9449_CR4","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S. Cimato","year":"2005","unstructured":"Cimato S., De Prisco R., De Santis A.: Optimal colored threshold visual cryptography scheme. Des. Codes Cryptogr. 35, 311\u2013335 (2005)","journal-title":"Des. Codes Cryptogr."},{"key":"9449_CR5","unstructured":"Cimato S., De Prisco R., De Santis A.: Colored visual cryptography without color darkening. In: Security in Communication Networks, LNCS, vol. 3352, pp. 235\u2013248. Springer-Verlag, Heidleberg (2005)."},{"key":"9449_CR6","unstructured":"Cox D., Little J., Osea D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, 2nd edn. Springer-Verlag, Heidleberg (1997)."},{"key":"9449_CR7","volume-title":"An Introduction to Gr\u00f6bner Basis","author":"R. Fr\u00f6berg","year":"1997","unstructured":"Fr\u00f6berg R.: An Introduction to Gr\u00f6bner Basis. Wiley, New York (1997)"},{"key":"9449_CR8","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.-C. How","year":"2003","unstructured":"How Y.-C.: Visual cryptography for color images. Pattern Recognit. 36, 1619\u20131629 (2003)","journal-title":"Pattern Recognit."},{"issue":"A(1)","key":"9449_CR9","first-page":"158","volume":"E85","author":"T. Ishihara","year":"2002","unstructured":"Ishihara T., Koga H.: New constructions of the lattice-based visual secret sharing scheme using mixture of colors. IEICE Trans. Fundam. E85(A(1)), 158\u2013166 (2002)","journal-title":"IEICE Trans. Fundam."},{"issue":"A(1)","key":"9449_CR10","first-page":"194","volume":"E86","author":"T. Ishihara","year":"2003","unstructured":"Ishihara T., Koga H.: A visual secret sharing scheme for color images based on meanvalue-color mixing. IEICE Trans. Fundam. E86(A(1)), 194\u2013197 (2003)","journal-title":"IEICE Trans. Fundam."},{"issue":"A(10)","key":"9449_CR11","first-page":"2172","volume":"E82","author":"R. Ito","year":"1999","unstructured":"Ito R., Kuwakado H., Tanaka H.: Image size invariant visual cryptography. IEICE Trans. Fundam. E82(A(10)), 2172\u20132177 (1999)","journal-title":"IEICE Trans. Fundam."},{"issue":"A(10)","key":"9449_CR12","first-page":"2238","volume":"E85","author":"M. Iwamoto","year":"2003","unstructured":"Iwamoto M., Yamamoto H.: The optimal n-out-of-n visual secret sharing scheme for gray-scale images. IEICE Trans. Fundam. E85(A(10)), 2238\u20132247 (2003)","journal-title":"IEICE Trans. Fundam."},{"issue":"A(10)","key":"9449_CR13","first-page":"2577","volume":"E86","author":"M. Iwamoto","year":"2003","unstructured":"Iwamoto M., Yamamoto H.: A construction method of visual secret sharing schemes for plural secret images. IEICE Trans. Fundam. E86(A(10)), 2577\u20132588 (2003)","journal-title":"IEICE Trans. Fundam."},{"issue":"A(6)","key":"9449_CR14","first-page":"1262","volume":"E83","author":"H. Koga","year":"1998","unstructured":"Koga H., Yamamoto H.: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fundam. E83(A(6)), 1262\u20131269 (1998)","journal-title":"IEICE Trans. Fundam."},{"issue":"A(1)","key":"9449_CR15","first-page":"262","volume":"E84","author":"H. Koga","year":"2001","unstructured":"Koga H., Iwamoto M., Yamamoto H.: An analytic construction of the visual secret sharing scheme for color images. IEICE Trans. Fundam E84(A(1)), 262\u2013272 (2001)","journal-title":"IEICE Trans. Fundam"},{"key":"9449_CR16","unstructured":"Koga H.: A general formula of the (t,n)-threshold visual secret sharing scheme. In: Advances in Cryptology\u2014ASIACRYPT 2002, LNCS, vol. 2001, pp. 328\u2013345. Springer-Verlag, Heidleberg (2002)."},{"issue":"1","key":"9449_CR17","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10623-005-6700-y","volume":"40","author":"H. Koga","year":"2006","unstructured":"Koga H., Ueda E.: Basic properties of the (t,n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des. Codes Cryptogr. 40(1), 81\u2013102 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"9449_CR18","unstructured":"Koga H., Ueda E.: Basic properties of the (t,n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. In: Proceedings of 2006 IEEE International Symposium on Information Theory, Seattle, pp. 912\u2013916 (2006)."},{"issue":"A(6)","key":"9449_CR19","first-page":"1379","volume":"E85","author":"H. Kuwakado","year":"2002","unstructured":"Kuwakado H., Tanaka H.: Polynomial representation of visual secret sharing scheme and its application. IEICE Trans. Fundam. E85(A(6)), 1379\u20131386 (2002)","journal-title":"IEICE Trans. Fundam."},{"key":"9449_CR20","unstructured":"Naor M., Shamir A.: Visual cryptography. In: Advance in Cryptology\u2013EUROCRYPT\u201994, LNCS, vol. 950, pp. 1\u201312. Springer-Verlag, Heidleberg (1995)."},{"key":"9449_CR21","unstructured":"Rijmen V., Preneel B.: Efficient colour visual encryption for shared colors of Benetton. presented at the Rump Session of EUROCRYPT 96, 1996. http:\/\/www.iacr.org\/conferences\/ec96\/rump\/preneel.ps ."},{"key":"9449_CR22","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1016\/j.patcog.2005.06.010","volume":"39","author":"S.J. Shyu","year":"2006","unstructured":"Shyu S.J.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866\u2013880 (2006)","journal-title":"Pattern Recogn."},{"issue":"2","key":"9449_CR23","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"E.R. Verheul","year":"1997","unstructured":"Verheul E.R., van Tilborg H.C.A.: Constructions and properties of k out of n visual secret sharing scheme. Des. Codes Cryptogr. 11(2), 179\u2013196 (1997)","journal-title":"Des. Codes Cryptogr."},{"key":"9449_CR24","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C.-N. Yang","year":"2000","unstructured":"Yang C.-N., Laih C.-S.: New colored visual secret sharing schemes. Des. Codes Cryptogr. 20, 325\u2013335 (2000)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9449-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9449-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9449-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:29Z","timestamp":1559231909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9449-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["9449"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9449-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}