{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:58:40Z","timestamp":1648591120883},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1587\/transinf.2019mup0005","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T17:06:52Z","timestamp":1577812012000},"page":"11-24","source":"Crossref","is-referenced-by-count":0,"title":["Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Mariko","family":"FUJII","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Sophia University"}]},{"given":"Tomoharu","family":"SHIBUYA","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Sciences, Sophia University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S. Droste, \u201cNew results on visual cryptography,\u201d Advances in Cryptology \u2014 CRYPT&apos;96, Lecture Notes in Computer Science, vol.1109, pp.401-415, Springer, Berlin, Heidelberg, 1996. 10.1007\/3-540-68697-5_30","DOI":"10.1007\/3-540-68697-5_30"},{"key":"2","unstructured":"[2] GNU Image Manipulation Program (GIMP), https:\/\/www.gimp.org\/"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] M. Iwamoto, \u201cA weak security notion for visual secret sharing schemes,\u201d IEEE Trans. Inf. Forensics Security, vol.7, no.2, pp.372-382, 2012. 10.1109\/tifs.2011.2170975","DOI":"10.1109\/TIFS.2011.2170975"},{"key":"4","unstructured":"[4] M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro, and K. Ohta, \u201cVisual secret sharing schemes for multiple secret images allowing the rotation of shares,\u201d IEICE Trans. Fundamentals, vol.E89-A, no.5, pp.1382-1395, May 2006."},{"key":"5","unstructured":"[5] T. Katoh and H. Imai, \u201cAn extended construction method of visual secret sharing scheme,\u201d IEICE Trans. Fundamentals (Japanese Edition), vol.J79-A, no.8, pp.1344-1351, Aug. 1996."},{"key":"6","unstructured":"[6] T. Kimoto, \u201cHigh quality template patterns for secret-sharing halftone images,\u201d IEICE Trans. Fundamentals (Japanese Edition), vol.J90-A, no.2, pp.131-141, Feb. 2007."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Naor and A. Shamir, \u201cVisual cryptography,\u201d Advances in Cryptology \u2014 EUROCRYPT&apos;94, Lecture Notes in Computer Science, vol.950, pp.1-12, Springer, Berlin, Heidelberg, 1995. 10.1007\/bfb0053419","DOI":"10.1007\/BFb0053419"},{"key":"8","unstructured":"[8] A. Rosenfeld and A.C. Kak (M. Nagao, Trans.), Digital Picture Processing, Kindai Kagaku Sha, 1978 (in Japanese)."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] A. Shamir, \u201cHow to share a secret,\u201d Commun. ACM, vol.22, no.11, pp.612-613, 1979. 10.1145\/359168.359176","DOI":"10.1145\/359168.359176"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] S.J. Shyu and K. Chen, \u201cVisual multiple secret sharing based upon turing and flipping,\u201d Information Science, vol.181, no.15, pp.3246-3266, 2011. 10.1016\/j.ins.2011.02.003","DOI":"10.1016\/j.ins.2011.02.003"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] S.J. Shyu and M.C. Chen, \u201cOptimum pixel expansions for threshold visual secret sharing schemes,\u201d IEEE Trans. Inf. Forensics Security, vol.6, no.3, pp.960-969, 2011. 10.1109\/tifs.2011.2158096","DOI":"10.1109\/TIFS.2011.2158096"},{"key":"12","unstructured":"[12] Y. Yamaguchi, \u201cA new scheme of visual cryptography for natural images,\u201d IPSJ SIG Technical Report, vol.2011-CG-144, no.6, pp.1-8, 2011."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/1\/E103.D_2019MUP0005\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:20:31Z","timestamp":1578270031000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/1\/E103.D_2019MUP0005\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019mup0005","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}