{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:59:13Z","timestamp":1729670353462,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscas.2005.1465891","type":"proceedings-article","created":{"date-parts":[[2005,7,27]],"date-time":"2005-07-27T13:52:28Z","timestamp":1122472348000},"page":"5537-5540","source":"Crossref","is-referenced-by-count":1,"title":["A New Visual Cryptography Using Natural Images"],"prefix":"10.1109","author":[{"family":"Hyoung Joong Kim","sequence":"first","affiliation":[]},{"family":"Yongsoo Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"hou","key":"3"},{"key":"2","first-page":"595","article-title":"visual cryptography for color images without pixel expansion","volume":"16","author":"hou","year":"2001","journal-title":"Journal of Technology"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1996.0076"},{"key":"7","first-page":"303","article-title":"extended visual cryptography for natural images","author":"nakajima","year":"2002","journal-title":"Proceedings of the 10th International Conference in Central Europe on Computer Graphics Visualization and Computer Vision"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00259-3"},{"key":"5","article-title":"secret sharing by natural image visual cryptography","author":"kim","year":"2005","journal-title":"WIAMIS"},{"key":"4","first-page":"2172","article-title":"image size invariant visual cryptography","volume":"e82 a","author":"ito","year":"2002","journal-title":"IEICE Transactions on Fundamentals"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019939020426"},{"key":"8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"visual cryptography","volume":"950","author":"naor","year":"1995","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2005 IEEE International Symposium on Circuits and Systems","location":"Kobe, Japan"},"container-title":["2005 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9898\/31469\/01465891.pdf?arnumber=1465891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:35:35Z","timestamp":1497634535000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1465891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iscas.2005.1465891","relation":{},"subject":[]}}