{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T04:32:04Z","timestamp":1648960324158},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-11132-3","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T10:02:51Z","timestamp":1625047371000},"page":"29519-29537","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Construction of XVCS for (k,n,t)\u2217 access structure"],"prefix":"10.1007","volume":"80","author":[{"given":"Pon Karthika","family":"K","sequence":"first","affiliation":[]},{"given":"Chandra Guru Sekar","family":"R","sequence":"additional","affiliation":[]},{"given":"Sylvia Lilly Jebarani","family":"W","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"11132_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10623-012-9722-2","volume":"71","author":"S Arumugam","year":"2014","unstructured":"Arumugam S, Lakshmanan R, Nagar AK (2014) On (k,n)\u2217-visual cryptography scheme. Des Codes Cryptogr 71:153\u2013162","journal-title":"Des Codes Cryptogr"},{"key":"11132_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86\u2013106","journal-title":"Inf Comput"},{"key":"11132_CR3","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.tcs.2007.01.006","volume":"374","author":"S Cimato","year":"2007","unstructured":"Cimato S, De Prisco R, De Santis A (2007) Colored visual cryptography without color darkening. Theor Comput Sci 374:261\u2013276","journal-title":"Theor Comput Sci"},{"key":"11132_CR4","doi-asserted-by":"crossref","unstructured":"Droste S (1996) New results on visual cryptography. In: Koblitz N (ed) Advances in cryptology-CRYPTO\u2019 96. Lecture notes in computer science, vol 1109. Springer, Berlin, pp 401\u2013415","DOI":"10.1007\/3-540-68697-5_30"},{"key":"11132_CR5","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1007\/s10623-018-0570-6","volume":"87","author":"S Dutta","year":"2019","unstructured":"Dutta S, Adhikari A, Ruj S (2019) Maximal contrast color visual secret sharing schemes. Des Codes Crypt 87:1699\u20131711","journal-title":"Des Codes Crypt"},{"key":"11132_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-018-6364-z","volume":"78","author":"Z Fu","year":"2018","unstructured":"Fu Z, Cheng Y, Bin Y (2018) Perfect recovery of XOR-based visual cryptography scheme. Multimed Tools Appl 78:1\u201318. https:\/\/doi.org\/10.1007\/s11042-018-6364-z","journal-title":"Multimed Tools Appl"},{"key":"11132_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.sigpro.2013.06.003","volume":"94","author":"T Guo","year":"2014","unstructured":"Guo T, Liu F, Wu C (2014) K out of K extended visual cryptography scheme by random grids. Sig Process 94:90\u2013101. https:\/\/doi.org\/10.1016\/j.sigpro.2013.06.003","journal-title":"Sig Process"},{"key":"11132_CR8","doi-asserted-by":"crossref","unstructured":"Guo T, Liu F, Wu C, Ren Y, Wang W (2013) On (k,n) visual cryptography scheme with t essential parties, ICITS","DOI":"10.1007\/978-3-319-04268-8_4"},{"issue":"21","key":"11132_CR9","doi-asserted-by":"publisher","first-page":"13883","DOI":"10.1007\/s11042-016-3250-4","volume":"75","author":"H Hu","year":"2016","unstructured":"Hu H, Shen G, Fu Z, Yu B, Wang J (2016) General construction for XOR-based visual cryptography and its extended capability. Multimed Tools Appl 75(21):13883\u201313911","journal-title":"Multimed Tools Appl"},{"key":"11132_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TIFS.2010.2072501","volume":"5","author":"F Liu","year":"2010","unstructured":"Liu F, Wu C, Lin X (2010) Step construction of visual cryptography schemes. IEEE Trans Inf Forensics Secur 5:27\u201338","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"#cr-split#-11132_CR11.1","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1995) Visual cryptography. In: De Santis A","DOI":"10.1007\/BFb0053419"},{"key":"#cr-split#-11132_CR11.2","unstructured":"(ed) EUROCRYPT 1994, LNCS, vol 950. Springer, Heidelberg, pp 1-12"},{"key":"11132_CR12","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.sigpro.2014.10.011","volume":"108","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W, Wu X (2015) Non-expansible XOR-based visual cryptography scheme with meaningful shares. Sig Process 108:604\u2013621. https:\/\/doi.org\/10.1016\/j.sigpro.2014.10.011","journal-title":"Sig Process"},{"key":"11132_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"ER Verheul","year":"1997","unstructured":"Verheul ER, Van Tilborg HCA (1997) Constructions and properties of k-out-of-n visual secret sharing schemes. Designs Codes and Cryptography 11:179\u2013196","journal-title":"Designs Codes and Cryptography"},{"issue":"10","key":"11132_CR14","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TIFS.2014.2346014","volume":"9","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) Extended capabilities for XOR-based visual cryptography. IEEE Trans Inf Forensics Secur 9(10):1592\u20131605","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11132_CR15","doi-asserted-by":"publisher","unstructured":"Yan X, Wang S, Niu X, Yang C-N (2014) Essential visual cryptographic scheme with different importance of shares. pp 636\u2013643. https:\/\/doi.org\/10.1007\/978-3-319-12643-2(7)7","DOI":"10.1007\/978-3-319-12643-2(7)7"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11132-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11132-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11132-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T18:14:27Z","timestamp":1629396867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11132-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":16,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["11132"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11132-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,30]]},"assertion":[{"value":"6 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}