{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T14:01:08Z","timestamp":1718460068797},"reference-count":18,"publisher":"Institution of Engineering and Technology (IET)","issue":"8","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1049\/iet-ipr.2015.0568","type":"journal-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T13:07:55Z","timestamp":1457960875000},"page":"590-597","source":"Crossref","is-referenced-by-count":8,"title":["Distortion\u2010free secret image sharing method with two meaningful shadows"],"prefix":"10.1049","volume":"10","author":[{"given":"Ching\u2010Chun","family":"Chang","sequence":"first","affiliation":[{"name":"Department of Computer ScienceUniversity of WarwickCoventryCV4 7ALUK"}]},{"given":"Yanjun","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichung40724Taiwan"}]},{"given":"Hsiao\u2010Ling","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichung40724Taiwan"}]}],"member":"265","published-online":{"date-parts":[[2016,8]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_2_6_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2224052"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_6_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.40"},{"key":"e_1_2_6_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.251"},{"key":"e_1_2_6_7_1","unstructured":"1994 Proc. of Advances in Cryptology\u2010Eurocrypt'94 Perugia Italy M. Naor A. Shamir Visual cryptography 1 12"},{"key":"e_1_2_6_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.819176"},{"key":"e_1_2_6_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00239-5"},{"key":"e_1_2_6_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.01.002"},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.11.022"},{"key":"e_1_2_6_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.04.012"},{"key":"e_1_2_6_13_1","article-title":"A visual secret sharing scheme with verification mechanism","author":"Chang C.C.","journal-title":"Int. J. Comput. Sci. Eng. Sys."},{"key":"e_1_2_6_14_1","unstructured":"2007 Proc. of IEEE TENCON 2007 Taipei Taiwan C.C. Chang T.D. Kieu Y.C. Chou Reversible data hiding scheme using two steganographic images 1 4"},{"key":"e_1_2_6_15_1","unstructured":"2009 Proc. Third Int. Conf. on Ubiquitous Information Management and Communication Suwon Korea C.F. Lee K.H. Wang C.C. Chang A reversible data hiding scheme based on dual steganographic images 228 237"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9529-x"},{"issue":"2","key":"e_1_2_6_17_1","first-page":"72","article-title":"Safeguarding visual information using (t, n) verifiable secret shares","volume":"22","author":"Chang C.C.","year":"2011","journal-title":"J. Comput."},{"issue":"1","key":"e_1_2_6_18_1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.image.2013.10.003","article-title":"A novel real\u2010time and progressive secret image sharing with flexible shadows based on compressive sensing","volume":"29","author":"Liu L.","year":"2014","journal-title":"Signal Process., Image Commun."},{"issue":"2","key":"e_1_2_6_19_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/ICIP.1996.560753","article-title":"Applications of toral automorphism in image watermarking","author":"Voyatzis G.","year":"1996","journal-title":"IEEE Trans. Image Process."}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2015.0568","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2015.0568","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2015.0568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T06:33:00Z","timestamp":1610605980000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2015.0568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["10.1049\/iet-ipr.2015.0568"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2015.0568","archive":["Portico"],"relation":{},"ISSN":["1751-9667","1751-9667"],"issn-type":[{"value":"1751-9667","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8]]}}}