{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:17:37Z","timestamp":1760955457253},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,4,6]],"date-time":"2014-04-06T00:00:00Z","timestamp":1396742400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11760-014-0619-6","type":"journal-article","created":{"date-parts":[[2014,4,5]],"date-time":"2014-04-05T06:33:31Z","timestamp":1396679611000},"page":"1659-1668","source":"Crossref","is-referenced-by-count":6,"title":["Threshold visual secret sharing with comprehensive properties based on random grids"],"prefix":"10.1007","volume":"9","author":[{"given":"Xuehu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,6]]},"reference":[{"key":"619_CR1","doi-asserted-by":"crossref","unstructured":"Ullagaddi, V., Hassan, F., Devabhaktuni, V.: Symmetric synchronous stream encryption using images. Signal Image Video Process. 1\u20138 (2012). doi: 10.1007\/s11760-012-0416-z","DOI":"10.1007\/s11760-012-0416-z"},{"issue":"8","key":"619_CR2","first-page":"877","volume":"4","author":"Li Li","year":"2012","unstructured":"Li, Li, El-Latif, A.A.A., Shi, Z., Niu, X.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res. J. Appl. Sci. Eng. Technol. 4(8), 877\u2013883 (2012)","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"key":"619_CR3","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptography, Eurocrypt\u201994, pp. 1\u201312 (1995)","DOI":"10.1007\/BFb0053419"},{"key":"619_CR4","doi-asserted-by":"crossref","unstructured":"Yan, X., Wang, S., El-Latif, A.A.A., et al.: New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video Process. 1\u201312 (2013). doi: 10.1007\/s11760-013-0465-y","DOI":"10.1007\/s11760-013-0465-y"},{"key":"619_CR5","doi-asserted-by":"crossref","unstructured":"Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Transactions on DHMS V, LNCS 6010, pp. 70\u2013105 (2010)","DOI":"10.1007\/978-3-642-14298-7_5"},{"issue":"1","key":"619_CR6","first-page":"74","volume":"31","author":"X-T Wu","year":"2011","unstructured":"Wu, X.-T., Sun, W.: Image sharing scheme based on error diffusion. J. Comput. Appl. 31(1), 74\u201381 (2011)","journal-title":"J. Comput. Appl."},{"key":"619_CR7","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.optlastec.2013.04.018","volume":"54","author":"AAA El-Latif","year":"2013","unstructured":"El-Latif, A.A.A., Yan, X., Li, L., Wang, N., Peng, J.L., Niu, X.: A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption. Optics Laser Technol. 54, 389\u2013400 (2013)","journal-title":"Optics Laser Technol."},{"issue":"1\/2","key":"619_CR8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1\/2), 143\u2013161 (2001)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"619_CR9","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C Yang","year":"2004","unstructured":"Yang, C.: New visual secret sharing scheme using probabilistic method. Pattern Recogn. Lett. 25(4), 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"8","key":"619_CR10","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/TIP.2006.875249","volume":"15","author":"Z Zhou","year":"2006","unstructured":"Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441\u20132453 (2006)","journal-title":"IEEE Trans. Image Process."},{"key":"619_CR11","doi-asserted-by":"crossref","unstructured":"Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, pp. 109\u2013112 (2006)","DOI":"10.1109\/ICIP.2006.312384"},{"issue":"2","key":"619_CR12","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/TIFS.2011.2116782","volume":"6","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307\u2013322 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"619_CR13","volume-title":"Modern Digital Halftoning","author":"DL Lau","year":"2000","unstructured":"Lau, D.L., Arce, G.R.: Modern Digital Halftoning. Marcel Dekker, New York (2000)"},{"issue":"10","key":"619_CR14","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","volume":"40","author":"D-S Wang","year":"2007","unstructured":"Wang, D.-S., Zhang, L., Ma, N., et al.: Two secret sharing scheme based on Boolean operations. Pattern Recogn. 40(10), 2776\u20132785 (2007)","journal-title":"Pattern Recogn."},{"issue":"6","key":"619_CR15","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Lett. 12(6), 377\u2013379 (1987)","journal-title":"Optics Lett."},{"issue":"3","key":"619_CR16","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.patcog.2006.02.025","volume":"40","author":"SJ Shyu","year":"2007","unstructured":"Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40(3), 1014\u20131031 (2007)","journal-title":"Pattern Recogn."},{"key":"619_CR17","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1016\/j.patcog.2008.11.015","volume":"42","author":"TH Chen","year":"2009","unstructured":"Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recogn. 42, 2203\u20132217 (2009)","journal-title":"Pattern Recogn."},{"issue":"1","key":"619_CR18","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1179\/174313107X214330","volume":"56","author":"DS Tsai","year":"2008","unstructured":"Tsai, D.S., Chen, T.H., Horng, G.: On generating meaningful shares in visual secret sharing scheme. Imaging Sci. 56(1), 49\u201355 (2008)","journal-title":"Imaging Sci."},{"key":"619_CR19","unstructured":"Chen, T.-H., Tsao, K.-H., Yang, Y.-T.: Friendly color visual secret sharing by random grids. Fundam. Inf. 96, 61\u201370 (2009)"},{"issue":"11","key":"619_CR20","doi-asserted-by":"crossref","first-page":"1693","DOI":"10.1109\/TCSVT.2011.2133470","volume":"21","author":"T-H Chen","year":"2011","unstructured":"Chen, T.-H., Tsao, K.-H.: User-friendly random-grid-based visual secret sharing. IEEE Trans. Circuits Syst. Video Technol. 21(11), 1693\u20131703 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"619_CR21","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"T Chen","year":"2011","unstructured":"Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197\u20131208 (2011)","journal-title":"J. Syst. Softw."},{"key":"619_CR22","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93, 977\u2013995 (2013)","journal-title":"Signal Process."},{"issue":"3","key":"619_CR23","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TIFS.2009.2024721","volume":"4","author":"Z Wang","year":"2009","unstructured":"Wang, Z., Arce, G.R.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383\u2013396 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"619_CR24","first-page":"121","volume":"48","author":"F Yi","year":"2008","unstructured":"Yi, F., Wang, D., Li, S., Dai, Y.: Probabilistic visual cryptography scheme with reversing. J. Tsinghua. Univ. (Sci & Tech) 48(1), 121\u2013123 (2008)","journal-title":"J. Tsinghua. Univ. (Sci & Tech)"},{"issue":"2","key":"619_CR25","first-page":"118","volume":"4","author":"X Yan","year":"2013","unstructured":"Yan, X., Wang, S., Li, L., El-Latif, A.A.A., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. J. Inf. Hiding Multimed. Signal Process. (JIHMSP) 4(2), 118\u2013126 (2013)","journal-title":"J. Inf. Hiding Multimed. Signal Process. (JIHMSP)"},{"key":"619_CR26","volume-title":"Digital Image Processing","author":"RC Gonzalez","year":"2001","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley Longman, Boston (2001)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0619-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-014-0619-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0619-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:45:57Z","timestamp":1559425557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-014-0619-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,6]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["619"],"URL":"https:\/\/doi.org\/10.1007\/s11760-014-0619-6","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,6]]}}}