{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:27:22Z","timestamp":1730258842454,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018921","name":"Yulin Science and Technology Bureau","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018921","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1109\/icspcc55723.2022.9984448","type":"proceedings-article","created":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T18:42:22Z","timestamp":1671820942000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A three-level QR code sharing scheme based on SLIC and Hamming code"],"prefix":"10.1109","author":[{"given":"Wei","family":"Wu","sequence":"first","affiliation":[{"name":"Xi’an University of Science and Technology,College of Computer Science and Technology,Xi’an,China"}]},{"given":"Lina","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi’an University of Science and Technology,College of Computer Science and Technology,Xi’an,China"}]},{"given":"Jiehui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi’an University of Science and Technology,College of Computer Science and Technology,Xi’an,China"}]},{"given":"Chenyu","family":"Cui","sequence":"additional","affiliation":[{"name":"Xi’an University of Science and Technology,College of Computer Science and Technology,Xi’an,China"}]},{"given":"Xiaoyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi’an University of Science and Technology,College of Computer Science and Technology,Xi’an,China"}]},{"given":"Miao","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi’an University of Science and Technology,College of Computer Science and Technology,Xi’an,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nedt.2022.105305"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2021.10.016"},{"issue":"2","key":"ref3","first-page":"109","article-title":"Overview of Visual Cryptographic Schemes [J]","author":"Qi","year":"2021","journal-title":"Intelligent Computers and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00258-3"},{"issue":"3","key":"ref5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1023\/A:1011271120274","article-title":"Improved Schemes for Visual Cryptography[J]","volume":"24","author":"Blundo","year":"2001","journal-title":"Designs Codes & Cryptography"},{"issue":"11","key":"ref6","first-page":"3460","article-title":"Two-level Information Management Scheme Based on Visual Password and QR Code [J]","volume":"33","author":"Yingying","year":"2016","journal-title":"Computer Application Research"},{"issue":"8","key":"ref7","first-page":"1215","article-title":"Visual optimization of two- dimensional code for presenting saliency features of human faces [J]","volume":"28","author":"Mingliang","year":"2016","journal-title":"Journal of Computer Aided Design and Graphics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.01.013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.03.080"},{"issue":"5","key":"ref10","first-page":"711","article-title":"A Threshold Multiple Secret Sharing Scheme Based on Hamming Code [J]","author":"Fulin","year":"2021","journal-title":"Journal of Hefei University of Technology (Natural Science Edition)"},{"journal-title":"Strategic Support Force Information Engineering University","article-title":"Research and design of image sharing scheme based on QR code [D]","year":"2019","author":"Sijia","key":"ref11"},{"key":"ref12","first-page":"1","article-title":"Visual Multi-Secret Sharing Scheme Based on Random Grid [J]","volume":"44","author":"Juntao","year":"2022","journal-title":"Journal of Electronics and Information"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103464"}],"event":{"name":"2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)","start":{"date-parts":[[2022,10,25]]},"location":"Xi'an, China","end":{"date-parts":[[2022,10,27]]}},"container-title":["2022 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9984156\/9984215\/09984448.pdf?arnumber=9984448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:43:37Z","timestamp":1706766217000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9984448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icspcc55723.2022.9984448","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]}}}