{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:55:24Z","timestamp":1769860524533,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,26]]},"DOI":"10.1145\/3430199.3430235","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T02:08:59Z","timestamp":1608602939000},"page":"140-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Color Multi-Secret Visual Cryptography Scheme"],"prefix":"10.1145","author":[{"given":"Rui","family":"Sun","sequence":"first","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Zhengxin","family":"Fu","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Bin","family":"Yu","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Hangying","family":"Huang","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"LNCS[C].","author":"Naor M","year":"1995","unstructured":"Naor M , Shamir A. Visual cryptography [A]. Advances in Cryptology-Eurocrypt '94 , LNCS[C]. Berlin : Springer-Verlag , 1995 . 950: 1--12. Naor M, Shamir A. Visual cryptography [A]. Advances in Cryptology-Eurocrypt '94, LNCS[C]. Berlin: Springer-Verlag, 1995. 950: 1--12."},{"issue":"8","key":"e_1_3_2_1_2_1","first-page":"39","article-title":"Graph decomposition and secret sharing schemes [J]","volume":"1995","author":"Blundo C","unstructured":"Blundo C , Santis A , Stinson D R . Graph decomposition and secret sharing schemes [J] . Journal of Cryptology. 1995 ( 8 ): 39 -- 64 . Blundo C, Santis A, Stinson D R. Graph decomposition and secret sharing schemes [J]. Journal of Cryptology. 1995(8): 39--64.","journal-title":"Journal of Cryptology."},{"key":"e_1_3_2_1_3_1","first-page":"401","article-title":"New Results on Visual Cryptography[C]. Advances in Cryptography-CRYPTO'96. 1996","volume":"1109","author":"Droste S","unstructured":"Droste S . New Results on Visual Cryptography[C]. Advances in Cryptography-CRYPTO'96. 1996 , LNCS 1109 , 401 -- 415 . Droste S. New Results on Visual Cryptography[C]. Advances in Cryptography-CRYPTO'96. 1996, LNCS 1109, 401--415.","journal-title":"LNCS"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"C.Blundo S. Cimato A. DeSantis Visual cryptography schemes with optimal pixel expansion Theoretical Computer Science 369(2006)169--182.  C.Blundo S. Cimato A. DeSantis Visual cryptography schemes with optimal pixel expansion Theoretical Computer Science 369(2006)169--182.","DOI":"10.1016\/j.tcs.2006.08.008"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771881.1771884"},{"key":"e_1_3_2_1_6_1","volume-title":"Eurocrypto'96","author":"Rijmen B.","year":"1996","unstructured":"V. Rijmen , B. Preneel , Efficient color visual encryption for shared colors of Benetton , Eurocrypto'96 , Rump Session , Berlin , 1996 . V. Rijmen, B. Preneel, Efficient color visual encryption for shared colors of Benetton, Eurocrypto'96, Rump Session, Berlin, 1996."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Ninth National Conference on Information Security","author":"Chang C.S.","year":"1999","unstructured":"C.C. Chang , C.S. Tsai , T.S. Chen , A technique for sharing a secret color image , Proceedings of the Ninth National Conference on Information Security , Taichung , May 1999 , pp. LXIII-LXXII. C.C. Chang, C.S. Tsai, T.S. Chen, A technique for sharing a secret color image, Proceedings of the Ninth National Conference on Information Security, Taichung, May 1999, pp. LXIII-LXXII."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00258-3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008280705142"},{"issue":"6","key":"e_1_3_2_1_10_1","first-page":"1262","article-title":"Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray -Scale Images[J]","volume":"81","author":"Koga H","year":"1998","unstructured":"Koga H , Yamamoto H . Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray -Scale Images[J] . Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences , 1998 , 81 ( 6 ): 1262 -- 1269 . Koga H, Yamamoto H. Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray -Scale Images[J]. Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences, 1998, 81(6):1262--1269.","journal-title":"Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences"},{"key":"e_1_3_2_1_11_1","volume-title":"Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images[J]. arXiv preprint arXiv:0712.4183","author":"Wang D S","year":"2007","unstructured":"Wang D S , Yi F , Li X. Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images[J]. arXiv preprint arXiv:0712.4183 , 2007 . Wang D S, Yi F, Li X. Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images[J]. arXiv preprint arXiv:0712.4183, 2007."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of International Conferences on Cryptology and Information Security [C]. 1996: 41--47","author":"Katoh T","unstructured":"Katoh T , Imai H. Some visual secret sharing schemes and their share size[A] . In: Proceedings of International Conferences on Cryptology and Information Security [C]. 1996: 41--47 . Katoh T, Imai H. Some visual secret sharing schemes and their share size[A]. In: Proceedings of International Conferences on Cryptology and Information Security [C]. 1996: 41--47."},{"key":"e_1_3_2_1_13_1","volume-title":"Two New Visual Cryptography Schemes: visual multi-secret sharing scheme and colored visual secret sharing scheme","author":"Wu Zonglin","year":"2001","unstructured":"Wu Zonglin . Two New Visual Cryptography Schemes: visual multi-secret sharing scheme and colored visual secret sharing scheme . National Dong Hwa University . Taiwan. 2001 Wu Zonglin. Two New Visual Cryptography Schemes: visual multi-secret sharing scheme and colored visual secret sharing scheme. National Dong Hwa University. Taiwan. 2001"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"61","article-title":"Multi-secret Sharing Visual Cryptography and Its Application to Cheater Detection","volume":"23","author":"Qiao Mingqiu","year":"2007","unstructured":"Qiao Mingqiu , Zhu Yuedong, Liu Huangping . Multi-secret Sharing Visual Cryptography and Its Application to Cheater Detection . Natural Sciences Journal of Harbin Normal University. 23 ( 2 ): 61 -- 65 , 2007 Qiao Mingqiu, Zhu Yuedong, Liu Huangping. Multi-secret Sharing Visual Cryptography and Its Application to Cheater Detection. Natural Sciences Journal of Harbin Normal University. 23(2):61--65, 2007","journal-title":"Natural Sciences Journal of Harbin Normal University."},{"key":"e_1_3_2_1_15_1","volume-title":"DBLP","author":"Yu B","year":"2008","unstructured":"Yu B , Fu Z , Fang L. A Modified Multi-Secret Sharing Visual Cryptography Scheme[C]\/\/ International Conference on Computational Intelligence & Security . DBLP , 2008 . Yu B, Fu Z, Fang L. A Modified Multi-Secret Sharing Visual Cryptography Scheme[C]\/\/ International Conference on Computational Intelligence & Security. DBLP, 2008."},{"key":"e_1_3_2_1_16_1","first-page":"38","article-title":"Securing Multiple Color Secrets Using Visual Cryptography[J]","author":"Vincent M J","year":"2012","unstructured":"Vincent M J , Helena E A . Securing Multiple Color Secrets Using Visual Cryptography[J] . Procedia Engineering , 2012 , 38 . Vincent M J, Helena E A. Securing Multiple Color Secrets Using Visual Cryptography[J]. Procedia Engineering, 2012, 38.","journal-title":"Procedia Engineering"},{"key":"e_1_3_2_1_17_1","volume-title":"A fully recovered (2, n) color visual cryptography scheme [J]. Journal of system simulation","author":"Zhang X H","year":"2016","unstructured":"Zhang X H , Fu Z X , OuyYang D , Yu B. A fully recovered (2, n) color visual cryptography scheme [J]. Journal of system simulation , 2016 (28):1444.(in Chinese) Zhang X H, Fu Z X, OuyYang D, Yu B. A fully recovered (2, n) color visual cryptography scheme [J]. Journal of system simulation, 2016(28):1444.(in Chinese)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.644-650.2108"},{"key":"e_1_3_2_1_19_1","volume-title":"Cryptography","author":"Chang","year":"2018","unstructured":"Chang , Joy, Jo-Yi , et al. A New Visual Multi-Secrets Sharing Scheme by Random Grids[J] . Cryptography , 2018 . Chang, Joy, Jo-Yi, et al. A New Visual Multi-Secrets Sharing Scheme by Random Grids[J]. Cryptography, 2018."}],"event":{"name":"AIPR 2020: 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China","acronym":"AIPR 2020"},"container-title":["Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430199.3430235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430199.3430235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:14Z","timestamp":1750191434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430199.3430235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,26]]},"references-count":19,"alternative-id":["10.1145\/3430199.3430235","10.1145\/3430199"],"URL":"https:\/\/doi.org\/10.1145\/3430199.3430235","relation":{},"subject":[],"published":{"date-parts":[[2020,6,26]]},"assertion":[{"value":"2020-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}