{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:45:53Z","timestamp":1729676753811,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275922","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"2072-2075","source":"Crossref","is-referenced-by-count":3,"title":["A novel 3&amp;#x2013;4 image secret sharing scheme"],"prefix":"10.1109","author":[{"given":"Rituraj","family":"Roy","sequence":"first","affiliation":[]},{"given":"Sayantani","family":"Bandyopadhyay","sequence":"additional","affiliation":[]},{"given":"Shyamalendu","family":"Kandar","sequence":"additional","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/3160-4377"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2012.6194475"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual Cryptography, Advances in Cryptology","volume":"950","author":"naor","year":"1995","journal-title":"Eurocrypt'94 Lecture Notes in Computer Science"},{"key":"ref13","first-page":"28","article-title":"An introduction to visual cryptography","author":"stinson","year":"1997","journal-title":"Public Key solutions'97"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.08.025"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00023-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583180"},{"key":"ref17","first-page":"592","article-title":"Improvement and implementation of the secret color image sharing technique","author":"hou","year":"1999","journal-title":"Proceedings of the Fifth Conference on Information Management"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00258-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345577"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.11"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2013-49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2038113"},{"key":"ref2","first-page":"313","article-title":"Safeguarding cryptography keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc of the AFIPS 1979 National Computer Conference"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.06.012"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275922.pdf?arnumber=7275922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:23:27Z","timestamp":1498235007000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275922","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}