{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:16:14Z","timestamp":1760955374687},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,7,13]],"date-time":"2012-07-13T00:00:00Z","timestamp":1342137600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s10623-012-9722-2","type":"journal-article","created":{"date-parts":[[2012,7,11]],"date-time":"2012-07-11T23:22:05Z","timestamp":1342048925000},"page":"153-162","source":"Crossref","is-referenced-by-count":38,"title":["On (k, n)*-visual cryptography scheme"],"prefix":"10.1007","volume":"71","author":[{"given":"S.","family":"Arumugam","sequence":"first","affiliation":[]},{"given":"R.","family":"Lakshmanan","sequence":"additional","affiliation":[]},{"given":"Atulya K.","family":"Nagar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,13]]},"reference":[{"key":"9722_CR1","unstructured":"Adhikari A., Dutta T.K., Roy B.: A new black and white visual cryptographic scheme for a general access structures. In: INDOCRYPT 2004, Canteaut, A., Viswanathan, K. (eds.) LNCS, 3348, 399\u2013413 (2004)."},{"key":"9722_CR2","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese G., Blundo C., Santis A.D., Stinson D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86\u2013106 (1996)","journal-title":"Inf. Comput."},{"key":"9722_CR3","unstructured":"Ateniese G., Blundo C., Santis A.D., Stinson D.R.: Construction and bounds for visual cryptography. In: Proc. ICALP 96, Springer, Berlin, pp. 416\u2013428 (1996)."},{"key":"9722_CR4","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo C., Bonis A.D., Santis A.D.: Improved scheme for visual cryptography. Des. Codes Cryptogr. 24, 255\u2013278 (2001)","journal-title":"Des. Codes Cryptogr."},{"key":"9722_CR5","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C. Blundo","year":"2006","unstructured":"Blundo C., Cimato S., Santis A.D.: Visual cryptography scheme with optimal pixel expansion. Theoret. Comput. Sci. 369, 169\u2013182 (2006)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"9722_CR6","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo C., Santis A.D., Stinson D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12(4), 261\u2013289 (1999)","journal-title":"J. Cryptol."},{"key":"9722_CR7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10623-009-9327-6","volume":"55","author":"M. Bose","year":"2010","unstructured":"Bose M., Mukerjee R.: Optimal (k,n) visual cryptography schemes for general k. Des. Codes Cryptogr. 55, 19\u201335 (2010)","journal-title":"Des. Codes Cryptogr."},{"key":"9722_CR8","unstructured":"Droste S.: New results on visual cryptography. In: Koblitz N. (ed.) Advances in Cryptology-CRYPTO\u2019 96. Lecture Notes in Computer Science, vol. 1109, pp. 401\u2013415. Springer, Berlin (1996)."},{"key":"9722_CR9","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister T., Krause M., Simon H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theoret. Comput. Sci. 240, 471\u2013485 (2000)","journal-title":"Theoret. Comput. Sci."},{"key":"9722_CR10","unstructured":"Krause M., Simon H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb. Probab. Comput. 12(3), 285\u2013299 (2003)."},{"key":"9722_CR11","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10623-005-6700-y","volume":"40","author":"H. Koga","year":"2006","unstructured":"Koga H., Ueda E.: Basic properties of (t,n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des. Codes Cryptogr. 40, 81\u2013102 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"9722_CR12","unstructured":"Naor M., Shamir A.: Visual cryptography. In: De Santis A. (ed.) Advances in Cryptography-EUROCRYPT\u2019 94. Lecture Notes in Computer Science, vol. 950, pp. 1\u201312. Springer, Berlin (1995)."},{"key":"9722_CR13","doi-asserted-by":"crossref","unstructured":"Verheul E.R., Van Tilborg H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptogr. 11(2), 179\u2013196 (1997).","DOI":"10.1023\/A:1008280705142"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9722-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-012-9722-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-012-9722-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:34Z","timestamp":1559231914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-012-9722-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,13]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["9722"],"URL":"https:\/\/doi.org\/10.1007\/s10623-012-9722-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,13]]}}}