{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:35:32Z","timestamp":1761964532262},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,12,24]],"date-time":"2013-12-24T00:00:00Z","timestamp":1387843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11042-013-1784-2","type":"journal-article","created":{"date-parts":[[2013,12,23]],"date-time":"2013-12-23T00:57:11Z","timestamp":1387760231000},"page":"3231-3252","source":"Crossref","is-referenced-by-count":58,"title":["Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery"],"prefix":"10.1007","volume":"74","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,24]]},"reference":[{"key":"1784_CR1","unstructured":"Chen TH, Tsao KH (2008) Image encryption by (n,n) random grids. In: Proceedings of 18th Information Security Conference, Hualien"},{"key":"1784_CR2","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"TH Chen","year":"2009","unstructured":"Chen TH, Tsao KH (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42:2203\u20132217","journal-title":"Pattern Recogn"},{"key":"1784_CR3","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T Chen","year":"2011","unstructured":"Chen T, Tsao K (2011) Threshold visual secret sharing by random grids. J Syst Softw 84:1197\u20131208","journal-title":"J Syst Softw"},{"issue":"10","key":"1784_CR4","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"W Dao-Shun","year":"2007","unstructured":"Dao-Shun W, Lei Z, Ning M et al (2007) Two secret sharing schemes based on Boolean operations [J]. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"issue":"1","key":"1784_CR5","first-page":"121","volume":"48","author":"YI Feng","year":"2008","unstructured":"Feng YI, Daoshun W, Shundong LI, Yiqi DAI (2008) Probabilistic visual cryptography scheme with reversing. J Tsinghua Univ Sci Tech 48(1):121\u2013123","journal-title":"J Tsinghua Univ Sci Tech"},{"issue":"11","key":"1784_CR6","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.1109\/TCSVT.2011.2106291","volume":"21","author":"Y-C Hou","year":"2011","unstructured":"Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Trans Circ Sys Vi Tech 21(11):1760\u20131764","journal-title":"IEEE Trans Circ Sys Vi Tech"},{"issue":"6","key":"1784_CR7","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377\u2013379","journal-title":"Opt Lett"},{"issue":"8","key":"1784_CR8","first-page":"877","volume":"4","author":"L Li","year":"2012","unstructured":"Li L, Abd El-Latif AA, Shi Z, Niu X (2012) A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res J Appl Sci Eng Technol 4(8):877\u2013883","journal-title":"Res J Appl Sci Eng Technol"},{"key":"1784_CR9","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1995) Visual cryptography, in Advances in Cryptography, Eurocrypt\u201994, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"1784_CR10","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"SJ Shyu","year":"2009","unstructured":"Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582\u20131596","journal-title":"Pattern Recogn"},{"key":"1784_CR11","doi-asserted-by":"crossref","unstructured":"Shyu, Shyong Jian (2007) Image encryption by random grids. Pattern Recognition 40.3: 1014\u20131031","DOI":"10.1016\/j.patcog.2006.02.025"},{"key":"1784_CR12","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s10623-004-3816-4","volume":"37","author":"P Tuyls","year":"2005","unstructured":"Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37:169\u2013186","journal-title":"Des Codes Crypt"},{"issue":"3","key":"1784_CR13","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang Z, Arce GR (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensics Secur 4(3):383\u2013396","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1784_CR14","doi-asserted-by":"crossref","unstructured":"Weir J, WeiQi Yan Jan (2010) A comprehensive study of visual cryptography, Transactions on DHMS V, LNCS 6010, pp 70\u2013105","DOI":"10.1007\/978-3-642-14298-7_5"},{"key":"1784_CR15","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","volume":"24","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image R 24:48\u201362","journal-title":"J Vis Commun Image R"},{"issue":"5","key":"1784_CR16","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"W Xiaotian","year":"2013","unstructured":"Xiaotian W, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977\u2013995","journal-title":"Signal Process"},{"key":"1784_CR17","unstructured":"Yan X, Wang S, Abd El-Latif AA, Sang J, Niu X, Threshold visual secret sharing based on Boolean operations, To be appear"},{"issue":"2","key":"1784_CR18","first-page":"118","volume":"4","author":"X Yan","year":"2013","unstructured":"Yan X, Wang S, Li L, Abd AA, El-Latif ZW, Niu X (2013) A new assessment measure of shadow image quality based on error diffusion techniques. J Inf Hiding Multimedia Signal Process (JIHMSP) 4(2):118\u2013126","journal-title":"J Inf Hiding Multimedia Signal Process (JIHMSP)"},{"issue":"4","key":"1784_CR19","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C Yang","year":"2004","unstructured":"Yang C (2004) New visual secret sharing schemes using probabilistic method [J]. Pattern Recogn Lett 25(4):481\u2013494","journal-title":"Pattern Recogn Lett"},{"issue":"8","key":"1784_CR20","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z Zhou","year":"2006","unstructured":"Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441\u20132453","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1784-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1784-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1784-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T04:12:55Z","timestamp":1564978375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1784-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,24]]},"references-count":20,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["1784"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1784-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,24]]}}}