{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:47:18Z","timestamp":1762033638696,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T00:00:00Z","timestamp":1558656000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T00:00:00Z","timestamp":1558656000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671448"],"award-info":[{"award-number":["61671448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002888","name":"Beijing Municipal Commission of Education","doi-asserted-by":"publisher","award":["KM201611232016"],"award-info":[{"award-number":["KM201611232016"]}],"id":[{"id":"10.13039\/501100002888","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11042-019-7698-x","type":"journal-article","created":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T09:04:11Z","timestamp":1558688651000},"page":"25299-25319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A new visual evaluation criterion of visual cryptography scheme for character secret image"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5635-6749","authenticated-orcid":false,"given":"Y.","family":"Ren","sequence":"first","affiliation":[]},{"given":"F.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"W.","family":"Yan","sequence":"additional","affiliation":[]},{"given":"W.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,24]]},"reference":[{"key":"7698_CR1","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo C, D\u2019 Arco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16:224\u2013261","journal-title":"SIAM J Discrete Math"},{"key":"7698_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C Blundo","year":"2001","unstructured":"Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Crypt 24:255\u2013278","journal-title":"Des Codes Crypt"},{"key":"7698_CR3","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/S0097-8493(98)00034-X","volume":"22","author":"C Blundo","year":"1998","unstructured":"Blundo C, De Santis A (1998) Visual cryptography schemes with perfect reconstruction of black pixels. Comput Graph 22:449\u2013455","journal-title":"Comput Graph"},{"key":"7698_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo C, De Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptology 12:261\u2013289","journal-title":"J Cryptology"},{"key":"7698_CR5","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T Chen","year":"2011","unstructured":"Chen T, Tsao K (2011) Threshold visual secret sharing by random grids. J Syst Software 84:1197\u20131208","journal-title":"J Syst Software"},{"key":"7698_CR6","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","volume":"177","author":"Y Chen","year":"2007","unstructured":"Chen Y, Chan Y, Huang C, Tsai M, Chu Y (2007) A multiple-level visual secret-sharing scheme without image size expansion. Inform Sci 177:4696\u20134710","journal-title":"Inform Sci"},{"key":"7698_CR7","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"Cimato S, De Prisco R, De Santis A (2005) Optimal colored threshold visual cryptography schemes. Des Codes Crypt 35:311\u2013335","journal-title":"Des Codes Crypt"},{"issue":"1","key":"7698_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97\u2013107","journal-title":"Comput J"},{"key":"7698_CR9","doi-asserted-by":"publisher","DOI":"10.1201\/b11068","volume-title":"Visual Cryptography and Secret Image Sharing","author":"S Cimato","year":"2011","unstructured":"Cimato S, Yang C (2011) Visual Cryptography and Secret Image Sharing. CRC Press-Taylor & Francis, Boca Raton"},{"key":"7698_CR10","doi-asserted-by":"crossref","unstructured":"Droste S (1996) New results on visual cryptography. In: Advances in Cryptography. Lecture Notes in Computer Science, vol 1109. Springer, Berlin, pp 401\u2013415","DOI":"10.1007\/3-540-68697-5_30"},{"key":"7698_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"PA Eisen","year":"2002","unstructured":"Eisen PA, Stinson DR (2002) Threshold visual cryptography schemes with specified whiteness levels of revealed pixels. Des Codes Crypt 25:15\u201361","journal-title":"Des Codes Crypt"},{"issue":"3","key":"7698_CR12","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1007\/s11042-013-1625-3","volume":"73","author":"Z Fu","year":"2014","unstructured":"Fu Z, Yu B (2014) Optimal pixel expansion of deterministic visual cryptography scheme. Multimed Tools Appl 73(3):1177\u20131193","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"7698_CR13","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo T, Liu F, Wu C (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Software 86(8):2094\u20132109","journal-title":"J Syst Software"},{"key":"7698_CR14","first-page":"179","volume":"37","author":"Y Hou","year":"2005","unstructured":"Hou Y, Tu S (2005) A visual cryptographic technique for chromatic images using multipixel encoding method. J Res Pract Inf Tech 37:179\u2013191","journal-title":"J Res Pract Inf Tech"},{"issue":"10","key":"7698_CR15","first-page":"2172","volume":"E82-A","author":"R Ito","year":"1999","unstructured":"Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE T FUND ELECTR E82-A(10):2172\u20132177","journal-title":"IEICE T FUND ELECTR"},{"key":"7698_CR16","doi-asserted-by":"crossref","unstructured":"Koga H (2002) A general formula of the threshold visual secret sharing scheme. In: Advances in Cryptology. Lecture Notes in Computer Science, vol 2501. Springer, Berlin, pp 328\u2013345","DOI":"10.1007\/3-540-36178-2_21"},{"key":"7698_CR17","doi-asserted-by":"crossref","unstructured":"Li P, Ma P, Li D (2012) Aspect ratio invariant visual cryptography scheme with optional size expansion. In: Eighth International Conference on IIH-MSP, pp 219\u2013222","DOI":"10.1109\/IIH-MSP.2012.59"},{"key":"7698_CR18","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F Liu","year":"2012","unstructured":"Liu F, Guo T, Wu C, Qian L (2012) Improving the visual quality of size invariant visual cryptography scheme. J Vis Commun Image R 23:331\u2013342","journal-title":"J Vis Commun Image R"},{"key":"7698_CR19","doi-asserted-by":"crossref","unstructured":"Liu F, Guo T, Wu C, Yang C (2014) Flexible visual cryptography scheme and its application. In: Transactions on Data Hiding and Multimedia Security IX, pp 110\u2013130","DOI":"10.1007\/978-3-642-55046-1_7"},{"key":"7698_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ipl.2010.01.003","volume":"110","author":"F Liu","year":"2010","unstructured":"Liu F, Wu C, Lin X (2010) A new definition of the contrast of visual cryptography scheme. Inform Process Let 110:241\u2013246","journal-title":"Inform Process Let"},{"key":"7698_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-09644-5","volume-title":"Visual Cryptography for Image Processing and Security: Theory Methods and Applications","author":"F Liu","year":"2014","unstructured":"Liu F, Yan W (2014) Visual Cryptography for Image Processing and Security: Theory Methods and Applications. Springer, Berlin"},{"key":"7698_CR22","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1995) Visual cryptography. In: Advances in Cryptography. Lecture Notes in Computer Science, vol 950. Springer, Berlin, pp 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"7698_CR23","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"S Shyu","year":"2007","unstructured":"Shyu S (2007) Image encryption by random grids. Pattern Recogn 40:1014\u20131031","journal-title":"Pattern Recogn"},{"key":"7698_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.tcs.2014.10.048","volume":"565","author":"S Shyu","year":"2015","unstructured":"Shyu S (2015) Visual cryptograms of random grids for threshold access structures. Theoretic Comput Sci 565:30\u201349","journal-title":"Theoretic Comput Sci"},{"issue":"3","key":"7698_CR25","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","volume":"6","author":"S Shyu","year":"2011","unstructured":"Shyu S, Chen M (2011) Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans Inf Forensics Secur 6(3):960\u2013969","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"7698_CR26","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/TCSVT.2015.2389372","volume":"25","author":"S Shyu","year":"2015","unstructured":"Shyu S, Chen M (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Trans Circuits Syst Video Technol 25(9):1557\u20131661","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"7698_CR27","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1023\/A:1019939020426","volume":"27","author":"W Tzeng","year":"2002","unstructured":"Tzeng W, Hu C (2002) A new approach for visual cryptography. Des Codes Crypt 27:207\u2013227","journal-title":"Des Codes Crypt"},{"key":"7698_CR28","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"ER Verheul","year":"1997","unstructured":"Verheul ER, Van Tilborg HCA (1997) Constructions and properties of k out of n visual secret sharing schemes. Des Codes Crypt 11:179\u2013196","journal-title":"Des Codes Crypt"},{"key":"7698_CR29","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-14298-7_5","volume":"6010","author":"J Weir","year":"2010","unstructured":"Weir J, Yan W (2010) A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security V 6010:70\u2013105","journal-title":"Transactions on Data Hiding and Multimedia Security V"},{"key":"7698_CR30","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93:977\u2013995","journal-title":"Signal Process"},{"key":"7698_CR31","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C Yang","year":"2004","unstructured":"Yang C (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Let 25:481\u2013494","journal-title":"Pattern Recogn Let"},{"issue":"5","key":"7698_CR32","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s00779-012-0535-0","volume":"17","author":"C Yang","year":"2013","unstructured":"Yang C, Chen P, Shih H, Kim C (2013) Aspect ratio invariant visual cryptography by image filtering and resizing. Pers Ubiquit Comput 17(5):843\u2013850","journal-title":"Pers Ubiquit Comput"},{"issue":"2","key":"7698_CR33","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.patrec.2004.08.025","volume":"26","author":"C Yang","year":"2005","unstructured":"Yang C, Chen T (2005) Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn Let 26(2):193\u2013206","journal-title":"Pattern Recogn Let"},{"issue":"7","key":"7698_CR34","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.patcog.2006.01.013","volume":"39","author":"C Yang","year":"2006","unstructured":"Yang C, Chen T (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39(7):1300\u20131314","journal-title":"Pattern Recogn"},{"key":"7698_CR35","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ins.2015.03.024","volume":"312","author":"C Yang","year":"2015","unstructured":"Yang C, Lin C (2015) Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels. Inform Sciences 312:131\u2013151","journal-title":"Inform Sciences"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7698-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7698-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7698-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T21:43:18Z","timestamp":1694900598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7698-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,24]]},"references-count":35,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7698"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7698-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,5,24]]},"assertion":[{"value":"30 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}