{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:36:59Z","timestamp":1730227019321,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612184","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:09Z","timestamp":1380638289000},"page":"169-174","source":"Crossref","is-referenced-by-count":1,"title":["A novel multi secret sharing scheme with MSB extraction using EVCS"],"prefix":"10.1109","author":[{"family":"Aarti","sequence":"first","affiliation":[]},{"given":"Pushpendra K.","family":"Rajput","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"A novel bit plane based image sharing scheme using evcs","author":"wu","year":"2010","journal-title":"International Conference on Information Networking and Automation (ICINA)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.031"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.11.010"},{"journal-title":"A Study on Visual Cryptography","year":"1998","author":"wu","key":"3"},{"key":"2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","volume":"950","author":"naor","year":"1995","journal-title":"Advances in Cryptology - Eurocrypt'94 Lecture Notes in Computer Science"},{"key":"1","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakely","year":"1979","journal-title":"Proceedings of the National Computer Conference"},{"key":"10","first-page":"401","article-title":"New results on visual cryptography","volume":"1109","author":"droste","year":"1996","journal-title":"Proceeding CRYPTO'96"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.875249"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.12.006"},{"key":"5","article-title":"Multi-secrets visual secret sharing","author":"chen","year":"2008","journal-title":"Proceedings of APCC2008 IEICE"},{"key":"4","first-page":"996","article-title":"The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing","author":"hsu","year":"2004","journal-title":"Proceedings of the 2004 IEEE International Conference on Networking"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2008.130"},{"key":"8","first-page":"1473","article-title":"Color extended visual cryptography using error diffusion","author":"kang","year":"2009","journal-title":"ICASSP"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2013,8,8]]},"location":"Noida, India","end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612184.pdf?arnumber=6612184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T02:56:07Z","timestamp":1610247367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6612184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612184","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}