{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:30:41Z","timestamp":1725575441912},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540243014"},{"type":"electronic","value":"9783540305989"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30598-9_17","type":"book-chapter","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T15:44:35Z","timestamp":1294847075000},"page":"235-248","source":"Crossref","is-referenced-by-count":2,"title":["Colored Visual Cryptography Without Color Darkening"],"prefix":"10.1007","author":[{"given":"S.","family":"Cimato","sequence":"first","affiliation":[]},{"given":"R.","family":"De Prisco","sequence":"additional","affiliation":[]},{"given":"A.","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-24582-7_11","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"A. Adhikari","year":"2003","unstructured":"Adhikari, A., Sikdar, S.: A new (2,n)-Visual Threshold Scheme for Color Images. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 148\u2013161. Springer, Heidelberg (2003)"},{"issue":"2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1006\/inco.1996.0076","volume":"129","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Informatiosn and Computation\u00a0129(2), 86\u2013106 (1996)","journal-title":"Informatiosn and Computation"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended Schemes for Visual Cryptography. Theoretical Computer Science\u00a0250, 143\u2013161 (2001)","journal-title":"Theoretical Computer Science"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1137\/S0895480198336683","volume":"16","author":"C. Blundo","year":"2003","unstructured":"Blundo, C., D\u2019Arco, P., De Santis, A., Stinson, D.R.: Contrast Optimal Threshold Visual Cryptography Schemes. SIAM J. on Discrete Math.\u00a016, 224\u2013261 (2003)","journal-title":"SIAM J. on Discrete Math."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1011271120274","volume":"24","author":"C. Blundo","year":"2001","unstructured":"Blundo, C., De Bonis, A., De Santis, A.: Improved Schemes for Visual Cryptography. Designs, Codes, and Cryptography\u00a024, 255\u2013278 (2001)","journal-title":"Designs, Codes, and Cryptography"},{"issue":"4","key":"17_CR6","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s001459900057","volume":"12","author":"C. Blundo","year":"1999","unstructured":"Blundo, C., De Santis, A., Stinson, D.R.: On the Contrast in Visual Cryptography Schemes. Journal of Cryptology\u00a012(4), 261\u2013289 (1999)","journal-title":"Journal of Cryptology"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Optimal Colored Threshold Visual Cryptography Schemes. Designs, Codes, and Cryptography (to appear)","DOI":"10.1007\/s10623-003-6741-z"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1012504516447","volume":"25","author":"P.A. Eisen","year":"2002","unstructured":"Eisen, P.A., Stinson, D.R.: Threshold Visual Cryptography Schemes With Specified Whiteness Levels of Reconstructed Pixels. Designs, Codes and Cryptography\u00a025, 15\u201361 (2002)","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/S0304-3975(99)00243-1","volume":"240","author":"T. Hofmeister","year":"2000","unstructured":"Hofmeister, T., Krause, M., Simon, H.U.: Contrast-Optimal k out of n Secret Sharing Schemes in Visual Cryptography. Theoretical Computer Science\u00a0240, 471\u2013485 (2000)","journal-title":"Theoretical Computer Science"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","volume":"36","author":"Y.-C. Hou","year":"2003","unstructured":"Hou, Y.-C.: Visual cryptography for color images. Pattern Recognition\u00a036, 1619\u20131629 (2003)","journal-title":"Pattern Recognition"},{"issue":"6","key":"17_CR11","first-page":"1262","volume":"81","author":"H. Koga","year":"1998","unstructured":"Koga, H., Yamamoto, H.: Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray-Scale Images. IEICE Trans. on Fundamentals of Electronics, Communication and Computer Sciences\u00a081-A(6), 1262\u20131269 (1998)","journal-title":"IEICE Trans. on Fundamentals of Electronics, Communication and Computer Sciences"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"2","key":"17_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1023\/A:1008280705142","volume":"11","author":"E.R. Verheul","year":"1997","unstructured":"Verheul, E.R., van Tilborg, H.C.A.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes, and Cryptography\u00a011(2), 179\u2013196 (1997)","journal-title":"Designs, Codes, and Cryptography"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1023\/A:1008382327051","volume":"20","author":"C.-N. Yang","year":"2000","unstructured":"Yang, C.-N., Laih, C.-S.: New Colored Visual Secret Sharing Schemes. Designs, Codes, and Cryptography\u00a020, 325\u2013335 (2000)","journal-title":"Designs, Codes, and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Security in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30598-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T18:39:25Z","timestamp":1553366365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30598-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540243014","9783540305989"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30598-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}