{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:56:52Z","timestamp":1772679412362,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T00:00:00Z","timestamp":1445904000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11554-015-0540-4","type":"journal-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T04:21:58Z","timestamp":1445919718000},"page":"61-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":110,"title":["An enhanced threshold visual secret sharing based on random grids"],"prefix":"10.1007","volume":"14","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ching-Nung","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,27]]},"reference":[{"issue":"7","key":"540_CR1","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"TH Chen","year":"2011","unstructured":"Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"540_CR2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97\u2013107 (2006)","journal-title":"Comput. J."},{"issue":"3\u20134","key":"540_CR3","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIFS.2014.2305574","volume":"9","author":"R Prisco De","year":"2014","unstructured":"De Prisco, R., De Santis, A.: On the relation of random grid and deterministic visual cryptography. IEEE Trans. Inform. Forensics Secur. 9(3\u20134), 653\u2013665 (2014)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"540_CR4","doi-asserted-by":"crossref","unstructured":"Fu, Z.X., Yu, B.: Visual cryptography and random grids schemes. In: Digital-Forensics and Watermarking, pp. 109\u2013122. Springer, Auckland (2014)","DOI":"10.1007\/978-3-662-43886-2_8"},{"issue":"8","key":"540_CR5","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1016\/j.jss.2013.03.062","volume":"86","author":"T Guo","year":"2013","unstructured":"Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094\u20132109 (2013)","journal-title":"J. Syst. Softw."},{"key":"540_CR6","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.sigpro.2013.06.003","volume":"94","author":"T Guo","year":"2014","unstructured":"Guo, T., Liu, F., Wu, C.: k out of k extended visual cryptography scheme by random grids. Signal Process. 94, 90\u2013101 (2014)","journal-title":"Signal Process."},{"issue":"7","key":"540_CR7","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"YC Hou","year":"2003","unstructured":"Hou, Y.C.: Visual cryptography for color images. Pattern Recognit. 36(7), 1619\u20131629 (2003)","journal-title":"Pattern Recognit."},{"issue":"6","key":"540_CR8","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377\u2013379 (1987)","journal-title":"Opt. Lett."},{"issue":"10","key":"540_CR9","first-page":"2172","volume":"82","author":"H Kuwakado","year":"1999","unstructured":"Kuwakado, H., Tanaka, H.: Image size invariant visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 82(10), 2172\u20132177 (1999)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"2","key":"540_CR10","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1049\/iet-ipr.2012.0338","volume":"7","author":"YS Lee","year":"2013","unstructured":"Lee, Y.S., Wang, B.J., Chen, T.H.: Quality-improved threshold visual secret sharing scheme by random grids. Image Process. IET 7(2), 137\u2013143 (2013)","journal-title":"Image Process. IET"},{"issue":"3","key":"540_CR11","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.jvcir.2012.01.003","volume":"23","author":"P Li","year":"2012","unstructured":"Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Rep. 23(3), 441\u2013453 (2012)","journal-title":"J. Vis. Commun. Image Rep."},{"issue":"2","key":"540_CR12","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jvcir.2011.11.003","volume":"23","author":"F Liu","year":"2012","unstructured":"Liu, F., Wu, C., Qian, L., et al.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Rep. 23(2), 331\u2013342 (2012)","journal-title":"J. Vis. Commun. Image Rep."},{"key":"540_CR13","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. Advances in CryptologyEUROCRYPT\u201994 Lecture Notes in Computer Science. Workshop on the Theory and Application of Cryptographic Techniques, May 9C12, pp. 1\u201312. Springer, Perugia (1995)","DOI":"10.1007\/BFb0053419"},{"issue":"3","key":"540_CR14","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014\u20131031 (2007)","journal-title":"Pattern Recognit."},{"key":"540_CR15","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","volume":"42","author":"SJ Shyu","year":"2009","unstructured":"Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42, 1582\u20131596 (2009)","journal-title":"Pattern Recognit."},{"issue":"10","key":"540_CR16","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D Wang","year":"2007","unstructured":"Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on boolean operations. Pattern Recognit. 40(10), 2776\u20132785 (2007)","journal-title":"Pattern Recognit."},{"issue":"3","key":"540_CR17","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383\u2013396 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"540_CR18","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.: A comprehensive study of visual cryptography. In: Transactions on DHMS V. LNCS 6010, pp. 70\u2013105. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14298-7_5"},{"issue":"5","key":"540_CR19","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5), 977\u2013995 (2013)","journal-title":"Signal Process."},{"key":"540_CR20","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.sigpro.2013.10.023","volume":"97","author":"X Wu","year":"2014","unstructured":"Wu, X., Sun, W.: Improved tagged visual cryptography by random grids. Signal Process. 97, 64\u201382 (2014)","journal-title":"Signal Process."},{"key":"540_CR21","doi-asserted-by":"crossref","unstructured":"Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimed. Tools Appl. 74(9), 3231\u20133252 (2015)","DOI":"10.1007\/s11042-013-1784-2"},{"key":"540_CR22","doi-asserted-by":"crossref","unstructured":"Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimed. Tools Appl. 74(21), 9279\u20139296 (2015)","DOI":"10.1007\/s11042-014-2080-5"},{"key":"540_CR23","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.sigpro.2014.06.011","volume":"105","author":"X Yan","year":"2014","unstructured":"Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process. 105, 389\u2013398 (2014)","journal-title":"Signal Process."},{"issue":"4","key":"540_CR24","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"CN Yang","year":"2004","unstructured":"Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481\u2013494 (2004)","journal-title":"Pattern Recognit. Lett."},{"key":"540_CR25","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.ins.2014.03.033","volume":"278","author":"CN Yang","year":"2014","unstructured":"Yang, C.N., Wu, C.C., Wang, D.S.: A discussion on the relationship between probabilistic visual cryptography and random grid. Inform. Sci. 278, 141\u2013173 (2014)","journal-title":"Inform. Sci."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-015-0540-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-015-0540-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-015-0540-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-015-0540-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T16:40:16Z","timestamp":1559407216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-015-0540-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,27]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["540"],"URL":"https:\/\/doi.org\/10.1007\/s11554-015-0540-4","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,27]]}}}