{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:05:27Z","timestamp":1743656727645,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-020-10239-3","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T00:02:07Z","timestamp":1610582527000},"page":"23485-23510","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Brauer configuration algebras for multimedia based cryptography and security applications"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0189-2982","authenticated-orcid":false,"given":"Mar\u00eda Alejandra Osorio","family":"Angarita","sequence":"first","affiliation":[]},{"given":"Agust\u00edn Moreno","family":"Ca\u00f1adas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"issue":"2","key":"10239_CR1","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo C, D\u2019Arco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discrete Math 16 (2):224\u2013261","journal-title":"SIAM J Discrete Math"},{"issue":"2","key":"10239_CR2","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.17654\/MS102061223","volume":"106","author":"AM Ca\u00f1adas","year":"2017","unstructured":"Ca\u00f1adas AM, Serna RJ, Giraldo H (2017) Matrix problems induced by visual cryptography schemes. Far East J Math Sci (FJMS) 106(2):1223\u20131241","journal-title":"Far East J Math Sci (FJMS)"},{"issue":"24","key":"10239_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/cryptography2030024","volume":"2","author":"J Chang","year":"2018","unstructured":"Chang J, Huang B, Juan J (2018) A new visual multi-secrets sharing scheme by random grids. Cryptography 2(24):1\u201311. https:\/\/doi.org\/10.3390\/cryptography2030024","journal-title":"Cryptography"},{"issue":"4","key":"10239_CR4","first-page":"9","volume":"11","author":"S Chaudhary","year":"2018","unstructured":"Chaudhary S, Nath R, Kant C (2018) Secure iris recognition with visual cryptography. International journal of signal processing, image processing and pattern recognition 11(4):9\u201320","journal-title":"International journal of signal processing, image processing and pattern recognition"},{"key":"10239_CR5","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1016\/j.sigpro.2012.02.015","volume":"92","author":"T Chen","year":"2012","unstructured":"Chen T, Taso K, Lee Y (2012) Yet another multiple-image encryption by rotating random grids. Signal Process 92:2229\u20132237","journal-title":"Signal Process"},{"key":"10239_CR6","unstructured":"Cimato S, De Prisco R, De Santis A (2012) Visual Cryptography for Color Images. In: Cimato S, Yang C (eds) Visual cryptography and secret image sharing. CRC Press, London"},{"key":"10239_CR7","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.bulsci.2017.06.001","volume":"141","author":"EL Green","year":"2017","unstructured":"Green EL, Schroll S (2017) Brauer configuration algebras: A generalization of Brauer graph algebras. Bull Sci Math 141:539\u2013572","journal-title":"Bull Sci Math"},{"issue":"5","key":"10239_CR8","first-page":"3893","volume":"79","author":"K Gurunathan","year":"2019","unstructured":"Gurunathan K, Rajagopalan SP (2019) A stegano-visual cryptography technique for multimedia security. Multimed Tools App 79(5):3893\u20133911. https:\/\/doi.org\/10.107\/s11042-019-7471-1","journal-title":"Multimed Tools App"},{"issue":"2","key":"10239_CR9","first-page":"303","volume":"10","author":"M Nakajima","year":"2002","unstructured":"Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images. WSCG Conference 2002 10(2):303\u2013310","journal-title":"WSCG Conference 2002"},{"key":"10239_CR10","volume-title":"Visual Cryptography. Advances in Cryptography: EUROCRYPT\u201994; Lecture Notes in Comput. Sci., vol 950","author":"M Naor","year":"1994","unstructured":"Naor M, Shamir A (1994) Visual Cryptography. Advances in Cryptography: EUROCRYPT\u201994; Lecture Notes in Comput. Sci., vol 950. Springer, Berlin"},{"issue":"3","key":"10239_CR11","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N Ratha","year":"2001","unstructured":"Ratha N, Conell J, Bolle R (2001) Enhancing security and privacy in biometrics based authentication systems. IBM Sys 40(3):614\u2013634","journal-title":"IBM Sys"},{"issue":"1","key":"10239_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TIFS.2010.2097252","volume":"6","author":"A Ross","year":"2011","unstructured":"Ross A, Othman A (2011) Visual cryptography for biometric privacy. IEEE Transactions on information forensics and security 6(1):70\u201381","journal-title":"IEEE Transactions on information forensics and security"},{"key":"10239_CR13","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern recognition 40:3633\u20133651","journal-title":"Pattern recognition"},{"key":"10239_CR14","unstructured":"Weir J, Yan W (2012) Visual cryptography and its applications. Jonathan Weir and Weiqi Yan & Ventus Publishing ApS. https:\/\/www.bookboon.com"},{"key":"10239_CR15","unstructured":"Wu CC, Chen LH (1998) A study on visual cryptography. Master thesis, PhD thesis, Institute of computer and information science, National Chiao Tung University, Taiwan"},{"key":"10239_CR16","doi-asserted-by":"crossref","unstructured":"Xi K, Hu J (2010) Bio-Cryptography. In: Stavroulakis P, Stamp M (eds) Handbook of information and communication security. Springer, Heidelberg","DOI":"10.1007\/978-3-642-04117-4_7"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10239-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10239-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10239-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T09:28:52Z","timestamp":1625304532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10239-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":16,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10239"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10239-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,13]]},"assertion":[{"value":"25 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}