{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T05:54:05Z","timestamp":1723010045811},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11042-021-11692-4","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T20:02:40Z","timestamp":1641672160000},"page":"6235-6257","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A cheating immune (k,\u00a0n) visual cryptography scheme by using the rotation of shares"],"prefix":"10.1007","volume":"81","author":[{"given":"Yongkang","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Fang-Wei","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"issue":"12","key":"11692_CR1","first-page":"86","volume":"3","author":"G Ateniese","year":"1996","unstructured":"Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Electron Colloquium Comput Complex 3(12):86\u2013106","journal-title":"Electron Colloquium Comput Complex"},{"issue":"7","key":"11692_CR2","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"TH Chen","year":"2011","unstructured":"Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197\u20131208","journal-title":"J Syst Softw"},{"issue":"11","key":"11692_CR3","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/TCSVT.2011.2133470","volume":"21","author":"TH Chen","year":"2011","unstructured":"Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circ Syst Video Technol 21(11):1693\u20131703","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"8","key":"11692_CR4","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo T, Liu F, Wu CK (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094\u20132109","journal-title":"J Syst Softw"},{"issue":"2","key":"11692_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10623-005-6342-0","volume":"38","author":"G Horng","year":"2006","unstructured":"Horng G, Chen T, Tsai DS (2006) Cheating in visual cryptography. Des Codes Cryptogr 38(2):219\u2013236","journal-title":"Des Codes Cryptogr"},{"issue":"1","key":"11692_CR6","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.ins.2013.01.006","volume":"233","author":"YC Hou","year":"2013","unstructured":"Hou YC, Quan ZY, Tsai CF, Tseng AY (2013) Block-based progressive visual secret sharing. Inf Sci 233(1):290\u2013304","journal-title":"Inf Sci"},{"key":"11692_CR7","unstructured":"Hsu HC, Chen TS, Lin YH (2004) The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. IEEE International Conference on Networking, Sensing and Control, pp 996\u20131001"},{"issue":"1","key":"11692_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2007","unstructured":"Hu CM, Tzeng W (2007) Cheating immune in visual cryptography. IEEE Trans Image Process 16(1):36\u201345","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"11692_CR9","first-page":"3401","volume":"12","author":"H Hu","year":"2018","unstructured":"Hu H, Shen G, Fu ZX, Yu B (2018) Improved contrast for threshold random-grid-based visual cryptography. KSII Trans Internet Inf Syst 12(7):3401\u20133420","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"6","key":"11692_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Optics Letters 12(6):377\u2013379","journal-title":"Optics Letters"},{"key":"11692_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2014.12.046","volume":"301","author":"PY Lin","year":"2015","unstructured":"Lin PY, Wang RZ, Chang YJ, Fang WP (2015) Prevention of cheating in visual cryptography by using coherent patterns. Inf Sci 301:61\u201374","journal-title":"Inf Sci"},{"key":"11692_CR12","first-page":"116","volume":"92","author":"ZQ Liu","year":"2021","unstructured":"Liu ZQ, Zhu GP, Ding F, Kwong S (2021) Weighted visual secret sharing for general access structures based on random grids. Signal Process Image Commun 92:116\u2013129","journal-title":"Signal Process Image Commun"},{"key":"11692_CR13","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1994) Visual cryptography, EUROCRYPT\u201994, (LNCS, 950), 1\u201312","DOI":"10.1007\/BFb0053419"},{"key":"11692_CR14","doi-asserted-by":"crossref","unstructured":"Prisco RD, Santis AD (2006) Cheating immune (2,n)-threshold visual secret sharing. SCN 216\u2013228","DOI":"10.1007\/11832072_15"},{"issue":"4","key":"11692_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1049\/iet-ifs.2016.0126","volume":"11","author":"YW Ren","year":"2017","unstructured":"Ren YW, Liu F, Guo T, Feng RQ, Lin DD (2017) Cheating immune visual cryptography scheme using Latin square. IET Inf Secur 11(4):211\u2013219","journal-title":"IET Inf Secur"},{"issue":"7","key":"11692_CR16","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"SJ Shyu","year":"2009","unstructured":"Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recognit 42(7):1582\u20131596","journal-title":"Pattern Recognit"},{"issue":"8","key":"11692_CR17","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1016\/j.patcog.2007.01.013","volume":"40","author":"DS Tsai","year":"2007","unstructured":"Tsai DS, Chen T, Horng G (2007) A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recognit 40(8):2356\u20132366","journal-title":"Pattern Recognit"},{"key":"11692_CR18","unstructured":"Wu CC, Chen LH (1998) A study on visual cryptography. Master Thesis. Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C,"},{"key":"11692_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.image.2019.03.017","volume":"75","author":"XT Wu","year":"2019","unstructured":"Wu XT, Lai ZR (2019) Random grid based color visual cryptography scheme for black and white secret images with general access structures. Signal Process Image Commun 75:100\u2013110","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"11692_CR20","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","volume":"24","author":"XT Wu","year":"2013","unstructured":"Wu XT, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image Represent 24(1):48\u201362","journal-title":"J Vis Commun Image Represent"},{"issue":"5","key":"11692_CR21","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"XT Wu","year":"2013","unstructured":"Wu XT, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977\u2013995","journal-title":"Signal Process"},{"issue":"4","key":"11692_CR22","first-page":"453","volume":"25","author":"MR Yadav","year":"2020","unstructured":"Yadav MR (2020) Cheating prevention and detection technique in visual secret sharing. Ingnierie des Systmes d Inf 25(4):453\u2013460","journal-title":"Ingnierie des Systmes d Inf"},{"issue":"1","key":"11692_CR23","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11554-016-0639-2","volume":"14","author":"XH Yan","year":"2018","unstructured":"Yan XH, Lu YL (2018) Participants increasing for threshold random grids-based visual secret sharing. J Real Time Image Process 14(1):13\u201324","journal-title":"J Real Time Image Process"},{"issue":"4","key":"11692_CR24","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481\u2013494","journal-title":"Pattern Recognit Lett"},{"key":"11692_CR25","first-page":"260","volume":"3","author":"CN Yang","year":"1999","unstructured":"Yang CN, Laih CS (1999) Some new types of visual secret sharing schemes. Proc National Computer Symp 3:260\u2013268","journal-title":"Proc National Computer Symp"},{"key":"11692_CR26","first-page":"2214","volume":"55","author":"CN Yang","year":"2020","unstructured":"Yang CN, Lin YC, Li P (2020) Cheating immune k-out-of-n block-based progressive visual cryptography. J Inf Secur Appl 55:2214\u20132216","journal-title":"J Inf Secur Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11692-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11692-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11692-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,23]],"date-time":"2022-02-23T08:15:56Z","timestamp":1645604156000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11692-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["11692"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11692-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"7 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}