{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T15:57:18Z","timestamp":1715011038987},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2014,6,13]],"date-time":"2014-06-13T00:00:00Z","timestamp":1402617600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11042-014-2080-5","type":"journal-article","created":{"date-parts":[[2014,6,12]],"date-time":"2014-06-12T07:32:34Z","timestamp":1402558354000},"page":"9279-9296","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Random grids-based visual secret sharing with improved visual quality via error diffusion"],"prefix":"10.1007","volume":"74","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,13]]},"reference":[{"key":"2080_CR1","unstructured":"Chen TH, Tsao KH (2008) Image encryption by (n,n) random grids. In: Proceedings of 18th Information Security Conference, Hualien"},{"key":"2080_CR2","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"TH Chen","year":"2009","unstructured":"Chen TH, Tsao KH (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42:2203\u20132217","journal-title":"Pattern Recogn"},{"key":"2080_CR3","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T Chen","year":"2011","unstructured":"Chen T, Tsao K (2011) Threshold visual secret sharing by random grids. J Syst Softw 84:1197\u20131208","journal-title":"J Syst Softw"},{"issue":"1","key":"2080_CR4","first-page":"121","volume":"48","author":"YI Feng","year":"2008","unstructured":"Feng YI, Daoshun WANG, Shundong LI, Yiqi DAI (2008) Probabilistic visual cryptography scheme with reversing. J Tsinghua Univ Sci Technol 48(1):121\u2013123","journal-title":"J Tsinghua Univ Sci Technol"},{"key":"2080_CR5","unstructured":"Floyd RW, and Steinberg L (1975) \u201cAn adaptive algorithm for spatial gray scale\u201d. International Symposium Digest of Technical Papers, Society for Information Displays 36"},{"key":"2080_CR6","first-page":"179","volume":"37","author":"Y Hou","year":"2005","unstructured":"Hou Y, Tu S (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Inf Technol 37:179\u2013192","journal-title":"J Res Pract Inf Technol"},{"issue":"6","key":"2080_CR7","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377\u2013379","journal-title":"Opt Lett"},{"key":"2080_CR8","volume-title":"Modern digital Halftoning","author":"DL Lau","year":"2000","unstructured":"Lau DL, Arce GR (2000) Modern digital Halftoning. Marcel Dekker, New York"},{"key":"2080_CR9","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F Liu","year":"2012","unstructured":"Liu F, Guo T, Wu C, Qian L (2012) Improving the visual quality of size invariant visual cryptography scheme. J Vis Commun Image Represent 23:331\u2013342","journal-title":"J Vis Commun Image Represent"},{"key":"2080_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","volume":"950","author":"M Naor","year":"1995","unstructured":"Naor M, Shamir A (1995) Visual cryptography, in advances in cryptography, Eurocrypt\u201994. Lect Notes Comput Sci 950:1\u201312","journal-title":"Lect Notes Comput Sci"},{"key":"2080_CR11","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"SJ Shyu","year":"2009","unstructured":"Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582\u20131596","journal-title":"Pattern Recogn"},{"issue":"3","key":"2080_CR12","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang Z, Arce GR (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383\u2013396","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"10","key":"2080_CR13","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D-S Wang","year":"2007","unstructured":"Wang D-S, Zhang L, Ma N (2007) Two secret sharing schemes based on boolean operations [J]. Pattern Recogn 40(10):2776\u20132785","journal-title":"Pattern Recogn"},{"key":"2080_CR14","first-page":"70","volume":"6010","author":"J Weir","year":"2010","unstructured":"Weir J, Yan WQ (2010) A comprehensive study of visual cryptography, Transactions on DHMS V. LNCS 6010:70\u2013105","journal-title":"LNCS"},{"key":"2080_CR15","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","volume":"24","author":"W Xiaotian","year":"2013","unstructured":"Xiaotian W (2013) Wei Sun, Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image R 24:48\u201362","journal-title":"J Vis Commun Image R"},{"key":"2080_CR16","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.jvcir.2013.03.002","volume":"24","author":"W Xiaotian","year":"2013","unstructured":"Xiaotian W, Liu T, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing via error diffusion. J Vis Commun Image R 24:552\u2013566","journal-title":"J Vis Commun Image R"},{"issue":"5","key":"2080_CR17","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"W Xiaotian","year":"2013","unstructured":"Xiaotian W, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977\u2013995","journal-title":"Signal Process"},{"issue":"8","key":"2080_CR18","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z Zhou","year":"2006","unstructured":"Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441\u20132453","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2080-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2080-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2080-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:32:04Z","timestamp":1559359924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2080-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,13]]},"references-count":18,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["2080"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2080-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,13]]}}}