{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:12:20Z","timestamp":1740100340712,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007085","name":"National University of Defense Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007085","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,15]]},"DOI":"10.1109\/ccci52664.2021.9583215","type":"proceedings-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T20:06:55Z","timestamp":1635365215000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Comparison and analysis of secret image sharing principles"],"prefix":"10.1109","author":[{"given":"Jiayu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lintao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68542-7_36"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080340"},{"key":"ref12","first-page":"1","article-title":"Weighted secret image sharing for a (k,n) threshold based on the chinese remainder theorem","volume":"pp","author":"longdan","year":"2019","journal-title":"IEEE Access"},{"key":"ref13","first-page":"1","article-title":"Visual cryptography","volume":"950","author":"naor","year":"1994","journal-title":"Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.06.011"},{"key":"ref15","article-title":"Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality","author":"wang","year":"2015","journal-title":"Digital Signal Processing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.10.048"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.11.014"},{"key":"ref18","article-title":"Embedded extended visual cryptography schemes","author":"feng","year":"2011","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2346014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref6","first-page":"1","article-title":"Robust secret image sharing scheme against noise in shadow images","volume":"pp","author":"sun","year":"2021","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6202-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"ref7","article-title":"How to share a secret","author":"mignotte","year":"1982","journal-title":"Workshop on Cryptography"},{"key":"ref2","article-title":"How to share a secret","author":"adi","year":"1979","journal-title":"Communications of the ACM"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001735"},{"key":"ref9","first-page":"6","article-title":"Image sharing based on chinese remainder theorem","volume":"12","author":"yan","year":"2000","journal-title":"Journal of North China University of technology"},{"key":"ref20","article-title":"Visual cryptography for general access structures","author":"giuseppe","year":"1996","journal-title":"Information and Computation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.033"},{"key":"ref21","article-title":"Generalized random grids-based threshold visual cryptography with meaningful shares","author":"xuehu","year":"2015","journal-title":"Signal Processing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2012.11.001"}],"event":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","start":{"date-parts":[[2021,10,15]]},"location":"Beijing, China","end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9583171\/9583183\/09583215.pdf?arnumber=9583215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:50Z","timestamp":1652201750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9583215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ccci52664.2021.9583215","relation":{},"subject":[],"published":{"date-parts":[[2021,10,15]]}}}