{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T13:47:40Z","timestamp":1744897660861,"version":"3.38.0"},"reference-count":22,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1016\/j.dsp.2011.07.004","type":"journal-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T22:46:23Z","timestamp":1312411583000},"page":"734-745","source":"Crossref","is-referenced-by-count":11,"title":["A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images"],"prefix":"10.1016","volume":"21","author":[{"given":"T. Hoang Ngan","family":"Le","sequence":"first","affiliation":[]},{"given":"Chia-Chen","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Hoai Bac","family":"Le","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"doi-asserted-by":"crossref","unstructured":"G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, American Federation of Information Processing Societies Proceedings, New York, USA, June 1979, pp. 313\u2013317.","key":"10.1016\/j.dsp.2011.07.004_br0010","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"11","key":"10.1016\/j.dsp.2011.07.004_br0020","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of ACM"},{"doi-asserted-by":"crossref","unstructured":"M. Noar, A. Shamir, Visual cryptography, in: Advances in Cryptology \u2013 Eurocrypt\u02bc94, in: Lecture Notes in Computer Science, vol. 950, 1995, pp. 1\u201312.","key":"10.1016\/j.dsp.2011.07.004_br0030","DOI":"10.1007\/BFb0053419"},{"unstructured":"M. Iwamoto, H. Yamamoto, The optimal n-out-of-n visual secret sharing scheme for grayscale images, in: IEICE Transactions Fundamentals, E85-A, vol. 10, 2002, pp. 2238\u20132247.","key":"10.1016\/j.dsp.2011.07.004_br0040"},{"key":"10.1016\/j.dsp.2011.07.004_br0050","series-title":"INDOCRYPT 2003","first-page":"148","article-title":"A new (2, n)-visual threshold scheme for color images","volume":"vol. 2904","author":"Adhikari","year":"2003"},{"issue":"7","key":"10.1016\/j.dsp.2011.07.004_br0060","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","article-title":"Visual cryptography for color images","volume":"36","author":"Hou","year":"2003","journal-title":"Pattern Recognition"},{"issue":"1","key":"10.1016\/j.dsp.2011.07.004_br0070","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","article-title":"Probabilistic visual cryptography schemes","volume":"49","author":"Cimato","year":"2006","journal-title":"The Computer Journal"},{"doi-asserted-by":"crossref","unstructured":"C.C. Chang, I.C. Lin, A new (t,n) threshold image hiding scheme for sharing a secret color image, in: Proceedings of the ICCT2003, vol. 1, 2003 pp. 196\u2013202.","key":"10.1016\/j.dsp.2011.07.004_br0080","DOI":"10.1109\/ICCT.2003.1209067"},{"issue":"3","key":"10.1016\/j.dsp.2011.07.004_br0090","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/j.jss.2004.07.250","article-title":"A new multi-secret images sharing scheme using Lagrange\u02bcs interpolation","volume":"76","author":"Feng","year":"2005","journal-title":"The Journal of Systems and Software"},{"issue":"6","key":"10.1016\/j.dsp.2011.07.004_br0100","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","article-title":"Secret image sharing with smaller shadow images","volume":"27","author":"Wang","year":"2006","journal-title":"Pattern Recognition Letters"},{"unstructured":"R. Ito, H. Kuwakado, H. Tanaka, Image size invariant visual cryptography, in: IEICE Transactions Fundamentals, E82-A, No. 10, 1999, pp. 2172\u20132177.","key":"10.1016\/j.dsp.2011.07.004_br0110"},{"issue":"4","key":"10.1016\/j.dsp.2011.07.004_br0120","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","article-title":"New visual secret sharing schemes using probabilistic method","volume":"25","author":"Yang","year":"2004","journal-title":"Pattern Recognition Letters"},{"key":"10.1016\/j.dsp.2011.07.004_br0130","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","article-title":"Two secret sharing schemes based on Boolean operations","volume":"40","author":"Wang","year":"2007","journal-title":"Pattern Recognition"},{"issue":"2","key":"10.1016\/j.dsp.2011.07.004_br0140","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0031-3203(01)00048-6","article-title":"Image restoration of compressed images using classified vector quantization","volume":"35","author":"Liaw","year":"2002","journal-title":"Pattern Recognition"},{"issue":"12","key":"10.1016\/j.dsp.2011.07.004_br0150","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1109\/26.64659","article-title":"Image compression using address-vector quantization","volume":"38","author":"Nasrabadi","year":"1990","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"10.1016\/j.dsp.2011.07.004_br0160","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1109\/TIT.1985.1057035","article-title":"Finite state vector quantization for waveform coding","volume":"31","author":"Foster","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"10.1016\/j.dsp.2011.07.004_br0170","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/83.136594","article-title":"Side match and overlap match vector quantizers for images","volume":"1","author":"Kim","year":"1992","journal-title":"IEEE Transactions on Image Processing"},{"issue":"10","key":"10.1016\/j.dsp.2011.07.004_br0180","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1016\/S0165-1684(02)00277-3","article-title":"Artifact reduction of JPEG coded images using mean-removed classified vector quantization","volume":"82","author":"Lai","year":"2002","journal-title":"Signal Processing"},{"issue":"3","key":"10.1016\/j.dsp.2011.07.004_br0190","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/83.148602","article-title":"Predictive classified vector quantization","volume":"1","author":"Ngan","year":"1992","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"10.1016\/j.dsp.2011.07.004_br0200","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.patcog.2007.04.015","article-title":"A fast VQ codebook generation algorithm using codeword displacement","volume":"41","author":"Lai","year":"2008","journal-title":"Pattern Recognition"},{"issue":"1","key":"10.1016\/j.dsp.2011.07.004_br0210","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00357-007-0007-9","article-title":"The Haar wavelet transform of a dendrogram","volume":"24","author":"Murtagh","year":"2007","journal-title":"Journal of Classification"},{"issue":"3","key":"10.1016\/j.dsp.2011.07.004_br0220","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","article-title":"A novel difference expansion transform for reversible data embedding","volume":"3","author":"Kim","year":"2008","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200411001151?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200411001151?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T03:32:02Z","timestamp":1741404722000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200411001151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":22,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["S1051200411001151"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2011.07.004","relation":{},"ISSN":["1051-2004"],"issn-type":[{"type":"print","value":"1051-2004"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}