{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T08:26:28Z","timestamp":1715761588117},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T00:00:00Z","timestamp":1471824000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NO.61070086"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation of Science and Technology on Information Assurance Laboratory of China","award":["NO.KJ-13-107"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11042-016-3867-3","type":"journal-article","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T07:38:37Z","timestamp":1471851517000},"page":"14511-14533","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["New insight into linear algebraic technique to construct visual cryptography scheme for general access structure"],"prefix":"10.1007","volume":"76","author":[{"given":"Gang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhengxin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,22]]},"reference":[{"issue":"3","key":"3867_CR1","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1007\/s10623-013-9832-5","volume":"73","author":"A Adhikari","year":"2014","unstructured":"Adhikari A (2014) Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des Codes Crypt 73(3):865\u2013895","journal-title":"Des Codes Crypt"},{"key":"3867_CR2","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G Ateniese","year":"1996","unstructured":"Ateniese G, Blundo C, De Santis A, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86\u2013106","journal-title":"Inf Comput"},{"issue":"4","key":"3867_CR3","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C Blundo","year":"1999","unstructured":"Blundo C, De Santis A, Stinson DR (1999) On the contrast in visual cryptography schemes. J Cryptol 12(4):261\u2013289","journal-title":"J Cryptol"},{"issue":"2","key":"3867_CR4","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C Blundo","year":"2003","unstructured":"Blundo C, Darco P, De Santis A, Stinson DR (2003) Contrast optimal threshold visual cryptography. SIAM J Discret Math 16(2):224\u2013261","journal-title":"SIAM J Discret Math"},{"key":"3867_CR5","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s10623-003-6741-z","volume":"35","author":"S Cimato","year":"2005","unstructured":"Cimato S, De Prisco R, De Santis A (2005) Optimal colored threshold cisual cryptography schemes. Des Codes Crypt 35:311\u2013335","journal-title":"Des Codes Crypt"},{"key":"3867_CR6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato S, De Prisco R, De Santis A (2006) Probabilistic Visual Cryptography Schemes. Comput J 49:97\u2013107","journal-title":"Comput J"},{"issue":"1","key":"3867_CR7","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s10623-015-0075-5","volume":"80","author":"S Dutta","year":"2016","unstructured":"Dutta S, Rohit RS, Adhikari A (2016) Constructions and analysis of some efficient t-(k, n)*-visual cryptographic schemes using linear algebraic techniques. Des Codes Cryptc 80(1):165\u2013196","journal-title":"Des Codes Cryptc"},{"key":"3867_CR8","doi-asserted-by":"crossref","unstructured":"Guo T, Liu F, Wu C, Ren YW, Wang W (2014) On (k, n) visual cryptography scheme with t essential parties. In: ICITS 2013. Lecture Notes in Computer Science, vol. 8317, pp 56\u201368. Springer, Berlin","DOI":"10.1007\/978-3-319-04268-8_4"},{"key":"3867_CR9","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.ins.2013.01.006","volume":"233","author":"YC Hou","year":"2013","unstructured":"Hou YC, Quan ZY, Tsai CF, Tseng AY (2013) Block-based progressive visual secret sharing. Inf Sci 233:290\u2013304","journal-title":"Inf Sci"},{"issue":"1","key":"3867_CR10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TIP.2006.884916","volume":"16","author":"CM Hu","year":"2007","unstructured":"Hu CM, Tzeng WG (2007) Cheating Prevention in Visual Cryptography. IEEE Trans Image Process 16(1):36\u201345","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"3867_CR11","first-page":"2033","volume":"6","author":"P Li","year":"2012","unstructured":"Li P, Ma PJ, Li D (2012) Aspect ratio invariant visual cryptography scheme with flexible size expansion. ICIC Express Letters 6(8):2033\u20132038","journal-title":"ICIC Express Letters"},{"issue":"1","key":"3867_CR12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1049\/iet-ifs.2008.0064","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu F, Wu CK, Lin XJ (2011) Cheating immune visual cryptography scheme. IET Inf Secur 5(1):51\u201359","journal-title":"IET Inf Secur"},{"key":"3867_CR13","doi-asserted-by":"crossref","unstructured":"Naor M, Shamir A (1994) Visual cryptography. In: Advance in Cryptography, Eurocrypt. Lecture Notes in Computer Science, vol. 950, pp. 1\u201312. Springer, Berlin","DOI":"10.1007\/BFb0053419"},{"issue":"3","key":"3867_CR14","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TIFS.2011.2158096","volume":"6","author":"SJ Shyu","year":"2011","unstructured":"Shyu SJ, Chen MC (2011) Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Trans Inf Forensics Secur 6(3):960\u2013969","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"3867_CR15","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/TIFS.2013.2250432","volume":"8","author":"SJ Shyu","year":"2013","unstructured":"Shyu SJ, Jiang HW (2013) General constructions for threshold multiple-secret visual cryptography schemes. IEEE Trans Inf Forensics Secur 8(5):733\u2013743","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"3867_CR16","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/TCSVT.2015.2389372","volume":"25","author":"SJ Shyu","year":"2015","unstructured":"Shyu SJ, Chen MC (2015) Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures. IEEE Trans Circuits Syst Video Technol 25 (9):1557\u20131561","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"3867_CR17","doi-asserted-by":"crossref","first-page":"3071","DOI":"10.1016\/j.patcog.2009.02.015","volume":"42","author":"DS Wang","year":"2009","unstructured":"Wang DS, Yi F, Li X (2009) On general construction for extended visual cryptography schemes. Pattern Recogn 42(11):3071\u20133082","journal-title":"Pattern Recogn"},{"issue":"9","key":"3867_CR18","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1109\/TIFS.2013.2274955","volume":"8","author":"XT Wu","year":"2013","unstructured":"Wu XT, Sun W (2013) Generalized Random Grid and Its Applications in Visual Cryptography. IEEE Trans Inf Forensics Secur 8(9):1541\u20131553","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3867_CR19","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-642-32205-1_19","volume":"7128","author":"Y Yamaguchi","year":"2012","unstructured":"Yamaguchi Y (2012) An Extended Visual Cryptography Scheme for Continuous-Tone Images. Springer Trans Digital Forensics and Watermarking 7128:228\u2013242","journal-title":"Springer Trans Digital Forensics and Watermarking"},{"key":"3867_CR20","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.dsp.2014.12.002","volume":"38","author":"XH Yan","year":"2015","unstructured":"Yan XH, Shen W, Niu XM, Yang CN (2015) Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Signal Process 38:53\u201365","journal-title":"Digital Signal Process"},{"key":"3867_CR21","unstructured":"Yan WQ, Jin D, Kankanhalli MS (2004) Visual cryptography for print and scan applications. In: ISCAS 2004. Proceedings of IEEE international symposium on circuits and systems, vol. 5, pp. 572\u2013575. IEEE, Canada"},{"key":"3867_CR22","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1016\/j.patcog.2006.01.013","volume":"39","author":"CN Yang","year":"2006","unstructured":"Yang CN, Chen TS (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39:1300\u20131314","journal-title":"Pattern Recogn"},{"key":"3867_CR23","first-page":"779","volume":"22","author":"CN Yang","year":"2012","unstructured":"Yang CN, Shih HW, Wu CC, Harn L (2012) k out of n region incrementing scheme in visual cryptography. IEEE Trans Circuits Syst Video Technol 22:779\u2013810","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"3867_CR24","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1007\/s11042-013-1479-8","volume":"72","author":"B Yu","year":"2014","unstructured":"Yu B, Shen G (2014) Multi-secret visual cryptography with deterministic contrast. Multi Tools Appl 72(2):1867\u20131886","journal-title":"Multi Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3867-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3867-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3867-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3867-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T20:47:21Z","timestamp":1568321241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3867-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,22]]},"references-count":24,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3867"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3867-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,22]]}}}