{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:16Z","timestamp":1750306456061,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NRF-2015R1A2A2A01006824"},{"name":"21A20131600005"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,11]]},"DOI":"10.1145\/2837126.2837142","type":"proceedings-article","created":{"date-parts":[[2016,4,12]],"date-time":"2016-04-12T12:23:12Z","timestamp":1460463792000},"page":"357-364","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Consistency Analysis for Secure Reconstruction in Secret Image Sharing"],"prefix":"10.1145","author":[{"given":"Anneke Soraya","family":"Hidayat","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea"}]},{"given":"Gil-Je","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea"}]},{"given":"Eun-Jun","family":"Yoon","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, Kyungil University, Gyenggsan-Si, Gyeongbuk, South Korea"}]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Kyungpook National University, Daegu, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_2_1","volume-title":"International Workshop on. IEEE Computer Society","author":"Blakley George Robert","year":"1899","unstructured":"Blakley , George Robert . \"Safeguarding cryptographic keys.\" Managing Requirements Knowledge , International Workshop on. IEEE Computer Society , 1899 . Blakley, George Robert. \"Safeguarding cryptographic keys.\" Managing Requirements Knowledge, International Workshop on. IEEE Computer Society, 1899."},{"key":"e_1_3_2_1_3_1","first-page":"371","article-title":"How to share a secret","author":"Mignotte Maurice","year":"1983","unstructured":"Mignotte , Maurice . \" How to share a secret .\" Cryptography. Springer Berlin Heidelberg , 1983 . 371 -- 375 . Mignotte, Maurice. \"How to share a secret.\" Cryptography. Springer Berlin Heidelberg, 1983. 371--375.","journal-title":"Cryptography. Springer Berlin Heidelberg"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"e_1_3_2_1_5_1","volume-title":"Carlo, et al. \"Multi-secret sharing schemes.\" Advances in Cryptology---CRYPTO'94","author":"Blundo","year":"1994","unstructured":"Blundo , Carlo, et al. \"Multi-secret sharing schemes.\" Advances in Cryptology---CRYPTO'94 . Springer Berlin Heidelberg , 1994 . Blundo, Carlo, et al. \"Multi-secret sharing schemes.\" Advances in Cryptology---CRYPTO'94. Springer Berlin Heidelberg, 1994."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0096-3003(03)00355-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.120"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.08.046"},{"key":"e_1_3_2_1_9_1","volume-title":"a survey.\" Coding and cryptology","author":"Beimel Amos","year":"2011","unstructured":"Beimel , Amos . \"Secret-sharing schemes : a survey.\" Coding and cryptology . Springer Berlin Heidelberg , 2011 . 11--46. Beimel, Amos. \"Secret-sharing schemes: a survey.\" Coding and cryptology. Springer Berlin Heidelberg, 2011. 11--46."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.223"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.022"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001409007090"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.01.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.031"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.016"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0064"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9265-8"},{"key":"e_1_3_2_1_20_1","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","author":"Wu Yue","year":"2011","unstructured":"Wu , Yue , Joseph P . Noonan , and Sos Agaian . \" NPCR and UACI randomness tests for image encryption .\" Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT)( 2011 ): 31 -- 38 . Wu, Yue, Joseph P. Noonan, and Sos Agaian. \"NPCR and UACI randomness tests for image encryption.\" Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT)(2011): 31--38.","journal-title":"Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT)("},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","author":"Explorable","year":"2009","unstructured":"Explorable .com (May 2 , 2009 ). Statistical Correlation . Retrieved Aug 10, 2015. Explorable.com: https:\/\/explorable.com\/statistical-correlation Explorable.com (May 2, 2009). Statistical Correlation. Retrieved Aug 10, 2015. Explorable.com: https:\/\/explorable.com\/statistical-correlation"}],"event":{"name":"MoMM 2015: The 13th International Conference on Advances in Mobile Computing and Multimedia","sponsor":["Johannes Kepler University, Linz, Austria","@WAS International Organization of Information Integration and Web-based Applications and Services"],"location":"Brussels Belgium","acronym":"MoMM 2015"},"container-title":["Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837126.2837142","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837126.2837142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:21Z","timestamp":1750225401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837126.2837142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":21,"alternative-id":["10.1145\/2837126.2837142","10.1145\/2837126"],"URL":"https:\/\/doi.org\/10.1145\/2837126.2837142","relation":{},"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"2015-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}