{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:24:40Z","timestamp":1730298280100,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/spcom.2018.8724438","type":"proceedings-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:48:36Z","timestamp":1559256516000},"page":"292-296","source":"Crossref","is-referenced-by-count":0,"title":["Affine Boolean Classification with FPGA Implementation on Secret Image Sharing"],"prefix":"10.1109","author":[{"given":"Tapasi","family":"Bhattacharjee","sequence":"first","affiliation":[]},{"given":"Hirak K.","family":"Maity","sequence":"additional","affiliation":[]},{"given":"Santi P.","family":"Maity","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.05.079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.001"},{"key":"ref11","first-page":"1","volume":"abs 1303 3527","author":"rout","year":"2013","journal-title":"Classification of Boolean Functions where Affine Functions are Uniformly Distributed"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","volume":"950","author":"naor","year":"1995","journal-title":"Advances in Cryptology - EUROCRYPT 98"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2015.01.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.01.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.11.015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S021812661750044X"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"4263","DOI":"10.1007\/s00542-016-3104-z","article-title":"An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking","volume":"23","author":"tapasi","year":"2017","journal-title":"Microsystem Technologies"}],"event":{"name":"2018 International Conference on Signal Processing and Communications (SPCOM)","start":{"date-parts":[[2018,7,16]]},"location":"Bangalore, India","end":{"date-parts":[[2018,7,19]]}},"container-title":["2018 International Conference on Signal Processing and Communications (SPCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8718087\/8724385\/08724438.pdf?arnumber=8724438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T09:11:58Z","timestamp":1643274718000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8724438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/spcom.2018.8724438","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}