{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T01:32:51Z","timestamp":1745285571064,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T00:00:00Z","timestamp":1626912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T00:00:00Z","timestamp":1626912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11202-6","type":"journal-article","created":{"date-parts":[[2021,7,22]],"date-time":"2021-07-22T17:02:36Z","timestamp":1626973356000},"page":"32023-32040","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Authentic secret share creation techniques using visual cryptography with public key encryption"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1439-9967","authenticated-orcid":false,"given":"M.","family":"Karolin","sequence":"first","affiliation":[]},{"given":"T.","family":"Meyyappan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,22]]},"reference":[{"key":"11202_CR1","unstructured":"Asha Bhadran R (2015) An improved visual cryptography scheme for color images. Int Res J Eng Technol 02(05)"},{"key":"11202_CR2","unstructured":"Gupta N, Vyas RR (2017) Image encryption using elliptic curve cryptography. International Journal of Innovation & Advancement in Computer Science 6(9)"},{"key":"11202_CR3","unstructured":"Hegde SS, Bhaskara Rao N (2011) Visual cryptography (VC) using Zigzag scan approach. IJCSET 1(8)"},{"key":"11202_CR4","doi-asserted-by":"crossref","unstructured":"Jesalkumari JA and Sedamkar RR (2013) \u201cModified Visual Cryptography Scheme for Colored Secret Image Sharing\u201d, in International Journal of Computer Applications Technology and Research ,Volume 2\u2013 Issue 3, 2013, pp: 350\u2013356.","DOI":"10.7753\/IJCATR0203.1027"},{"key":"11202_CR5","doi-asserted-by":"publisher","unstructured":"Karolin M, Meyyappan T (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng\u00a04(7):151\u2013155.\u00a0https:\/\/doi.org\/10.17148\/IJARCCE.2015.4734","DOI":"10.17148\/IJARCCE.2015.4734"},{"key":"11202_CR6","doi-asserted-by":"publisher","unstructured":"Karolin M, Meyyappan T (2019) Secret multiple share creation with color images using visual cryptography. International conference on communication and signal processing April 4\u20136 2019, pp 0058\u20130062. https:\/\/doi.org\/10.1109\/iccsp.2019.8698013","DOI":"10.1109\/iccsp.2019.8698013"},{"key":"11202_CR7","doi-asserted-by":"publisher","unstructured":"Karolin M, Meyyappan T (2019) Image encryption and decryption using RSA algorithm with share creation techniques. Int J Eng Adv Technol 9(2):2797\u20132800.\u00a0https:\/\/doi.org\/10.35940\/ijeat.B4021.129219","DOI":"10.35940\/ijeat.B4021.129219"},{"key":"11202_CR8","doi-asserted-by":"crossref","unstructured":"Loukhaoukha K, Chouinard J, Berdai A (2012) A secure image encryption algorithm based on Rubik\u2019s cube principle. J Electr Comput Eng 2012","DOI":"10.1155\/2012\/173931"},{"key":"11202_CR9","unstructured":"Mahto D member Iaeng, Danish Ali Khan member Iaeng and Dilip Kumar yadav member Iaeng \u201cSecurity Analysis of Elliptic Curve Cryptography and RSA\u201d Proceeding of the World Congress on Engineering July1, 2016, Vol: 1."},{"key":"11202_CR10","doi-asserted-by":"publisher","unstructured":"Naor M, Shamir A (1995) Visual cryptography. Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes Computer Science 950:1\u201312. https:\/\/doi.org\/10.1007\/BFb0053419","DOI":"10.1007\/BFb0053419"},{"key":"11202_CR11","unstructured":"Pandey LN and Shukla N (2013) \u201cVisual Cryptography Schemes using Compressed Random Shares\u201d, in International Journal of Advanced Research in Computer Science and Management Studies, Volume 1, Issue 4, pp:62\u201366."},{"key":"11202_CR12","doi-asserted-by":"publisher","unstructured":"Patel and Srivastava (2017) \u201cA new technique for color share generation using visual cryptography\u201d 2016 International Conference on Inventive Computation Technologies, January 2017, DOI: https:\/\/doi.org\/10.1109\/INVENTIVE.2016.7824848, Publisher: IEEE.","DOI":"10.1109\/INVENTIVE.2016.7824848"},{"key":"11202_CR13","unstructured":"Patel N, Vyavahare P and Panchal M (2016) \u201cA Novel Verifiable Multi-Secret sharing scheme Based on Elliptic Curve Cryptography\u201d 2016 Tenth International Conference on Emerging security Information, Systems and Technologies ISBN: 978\u20131\u201361208-493-0."},{"key":"11202_CR14","doi-asserted-by":"publisher","unstructured":"Priyanka, Kulkarni (2019) Secret image sharing using 2-pixel visual cryptography encryption. Int J Recent\u00a0Technol Eng 8(4).\u00a0https:\/\/doi.org\/10.35940\/ijrte.C4307.118419","DOI":"10.35940\/ijrte.C4307.118419"},{"key":"11202_CR15","unstructured":"Rijmen V, Preneel B (1996) Efficient color visual encryption for shared colors of benetton. Eurocrypto\u201996, Rump Session, Berlin"},{"key":"11202_CR16","doi-asserted-by":"publisher","unstructured":"Saturwar, Chaudhari (2017) Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking. 2017 Second International Conference on Electrical, Computer and Communication Technologies, November 2017. https:\/\/doi.org\/10.1109\/ICECCT.2017.8117849, Publisher: IEEE","DOI":"10.1109\/ICECCT.2017.8117849"},{"key":"11202_CR17","doi-asserted-by":"crossref","unstructured":"Shankar K, Eswaran P (2016) RGB based secure share creation in visual cryptography using optimal elliptic curve cryptography techniques. J Circuits\u00a0Syst Comput\u00a025(11)","DOI":"10.1142\/S0218126616501383"},{"key":"11202_CR18","unstructured":"Sharma M, Saraswat R (2013) Secure visual cryptography technique for color images using RSA algorithm. Int J Engi Innov Technol 2(10)"},{"key":"11202_CR19","doi-asserted-by":"crossref","unstructured":"Singh SR, Khan AK and Singh TS (2016) \u201cA Critical Review on Elliptic Curve Cryptography\u201d 2016 International Conference on Automatic Control and dynamic Optimization Techniques.","DOI":"10.1109\/ICACDOT.2016.7877543"},{"key":"11202_CR20","doi-asserted-by":"publisher","unstructured":"Vandana, Sreela (2017) An improved secret sharing using XOR-based visual cryptography.\u00a02016 Online International Conference on Green Engineering and Technologies, May 2017.\u00a0https:\/\/doi.org\/10.1109\/GET.2016.7916633, Publisher: IEEE","DOI":"10.1109\/GET.2016.7916633"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11202-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11202-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11202-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T04:42:57Z","timestamp":1633840977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11202-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,22]]},"references-count":20,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11202"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11202-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,7,22]]},"assertion":[{"value":"1 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}