{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:12:23Z","timestamp":1729660343454,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/rivf.2009.5174642","type":"proceedings-article","created":{"date-parts":[[2009,7,29]],"date-time":"2009-07-29T11:33:46Z","timestamp":1248867226000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Hybrid (2, n) Visual Secret Sharing Scheme for Color Images"],"prefix":"10.1109","author":[{"given":"Jung-San","family":"Lee","sequence":"first","affiliation":[]},{"given":"T. Hoang Ngan","family":"Le","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s00357-007-0007-9"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.015"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00048-6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/83.136594"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(02)00277-3"},{"key":"13","first-page":"2172","article-title":"image size invariant visual cryptography","author":"ito","year":"1999","journal-title":"IEICE Transactions on Fundamentals"},{"key":"14","first-page":"2238","article-title":"the optimal n-out of-n visual secret sharing scheme for grayscale images","volume":"10","author":"iwamoto","year":"2002","journal-title":"IEICE Transactions on Fundamentals"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00258-3"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.08.001"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/26.64659"},{"key":"20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"visual cryptography","volume":"950","author":"naor","year":"1995","journal-title":"Advances in Cryptology - Eurocrypt'94 Lecture Notes in Computer Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/83.148602"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.021"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.11.018"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2003.12.011"},{"key":"3","first-page":"313","article-title":"safeguarding cryptographic keys","author":"blakley","year":"1979","journal-title":"Proceedings of the National Computer Conference American Federation of Information Processing Societies"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057035"},{"key":"1","first-page":"148","article-title":"a new (2, n)-visual threshold scheme for color images","volume":"2904","author":"adhikari","year":"2003","journal-title":"DOCRYPT 2003 Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.05.011"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.128"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2008.140"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2003.1209067"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.07.250"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh152"}],"event":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","start":{"date-parts":[[2009,7,13]]},"location":"Danang City, Viet Nam","end":{"date-parts":[[2009,7,17]]}},"container-title":["2009 IEEE-RIVF International Conference on Computing and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5174598\/5174599\/05174642.pdf?arnumber=5174642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T18:23:05Z","timestamp":1497810185000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5174642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/rivf.2009.5174642","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}