{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:42:12Z","timestamp":1762004532977},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/tifs.2013.2281108","type":"journal-article","created":{"date-parts":[[2013,9,9]],"date-time":"2013-09-09T18:34:03Z","timestamp":1378751643000},"page":"2059-2072","source":"Crossref","is-referenced-by-count":50,"title":["Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing"],"prefix":"10.1109","volume":"8","author":[{"given":"Dao-Shun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Song","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Ching-Nung","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"450","article-title":"Two kinds of ideal contrast visual cryptography schemes","author":"tan","year":"2009","journal-title":"Proc 2009 Int Conf on Signal Processing Syst (ICSPS 2009)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.4.3.104-111"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC.2010.320"},{"key":"ref13","author":"muecke","year":"1999","journal-title":"Greyscale and Color Visual Cryptography"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00108-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-004-3816-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.11.018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.128"},{"key":"ref18","first-page":"1","article-title":"a pvss scheme based on boolean operations with improved contrast","author":"ulutas","year":"2009","journal-title":"2009 International Conference on Network and Service Security n2s"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001409007090"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011271120274"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(98)00034-X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.10.011"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/978-3-540-24660-2_27","article-title":"Almost ideal contrast visual cryptography with reversing","volume":"2964","author":"viet","year":"2004","journal-title":"Proc Topics in Cryptology (CT-RSA 2006)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_22"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008280705142"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","volume":"950","author":"naor","year":"1995","journal-title":"Proc Advances in Cryptology (EUROCRYPTO'94)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm118"},{"key":"ref20","author":"wang","year":"2011","journal-title":"Visual Cryptography and Secret Image Sharing"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6656843\/06594814.pdf?arnumber=6594814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:45:13Z","timestamp":1638218713000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6594814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":20,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2281108","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}