{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:01:45Z","timestamp":1768485705417,"version":"3.49.0"},"reference-count":9,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2002,6,1]],"date-time":"2002-06-01T00:00:00Z","timestamp":1022889600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[2002,6]]},"DOI":"10.1016\/s0167-8655(02)00023-5","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T23:55:37Z","timestamp":1034639737000},"page":"931-941","source":"Crossref","is-referenced-by-count":113,"title":["An image intellectual property protection scheme for gray-level images using visual secret sharing strategy"],"prefix":"10.1016","volume":"23","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jun-Chou","family":"Chuang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-8655(02)00023-5_BIB1","first-page":"237","article-title":"A simple picture hiding scheme","volume":"12","author":"Chang","year":"1998","journal-title":"Comput. Process. Orient. Lang."},{"key":"10.1016\/S0167-8655(02)00023-5_BIB2","first-page":"992","article-title":"An asymmetric watermarking scheme based on visual cryptography","volume":"vol. 2","author":"Hou","year":"2000"},{"key":"10.1016\/S0167-8655(02)00023-5_BIB3","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/S0167-8655(02)00023-5_BIB4","first-page":"691","article-title":"An improved threshold scheme based on modular arithmetic","volume":"15","author":"Hwang","year":"1999","journal-title":"J. Inform. Sci. Eng."},{"key":"10.1016\/S0167-8655(02)00023-5_BIB5","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1117\/1.1346585","article-title":"Hiding a picture in two pictures","volume":"40","author":"Hwang","year":"2001","journal-title":"Opt. Eng."},{"key":"10.1016\/S0167-8655(02)00023-5_BIB6","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1049\/el:19990327","article-title":"Wavelet based watermarking method for digital images using the human visual system","volume":"35","author":"Kim","year":"1999","journal-title":"Electron. Lett."},{"key":"10.1016\/S0167-8655(02)00023-5_BIB7","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/5.771070","article-title":"Digital watermarking for telltale tamper proofing and authentication","volume":"87","author":"Kundur","year":"1999","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0167-8655(02)00023-5_BIB8","first-page":"1","article-title":"Visual Cryptography, Advances in Cryptography: Eurocrypt '94","author":"Naor","year":"1994"},{"key":"10.1016\/S0167-8655(02)00023-5_BIB9","first-page":"237","article-title":"Applications of total automorphisms in image watermarking","volume":"2","author":"Voyatzis","year":"1996","journal-title":"Image Process. Conf."}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865502000235?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167865502000235?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T01:52:16Z","timestamp":1556934736000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167865502000235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,6]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2002,6]]}},"alternative-id":["S0167865502000235"],"URL":"https:\/\/doi.org\/10.1016\/s0167-8655(02)00023-5","relation":{},"ISSN":["0167-8655"],"issn-type":[{"value":"0167-8655","type":"print"}],"subject":[],"published":{"date-parts":[[2002,6]]}}}