{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363388844934013952.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1016/s0304-3975(99)00127-9"}},{"identifier":{"@type":"URI","@value":"https://api.elsevier.com/content/article/PII:S0304397599001279?httpAccept=text/xml"}},{"identifier":{"@type":"URI","@value":"https://api.elsevier.com/content/article/PII:S0304397599001279?httpAccept=text/plain"}},{"identifier":{"@type":"NAID","@value":"30006146445"}}],"dc:title":[{"@value":"Extended capabilities for visual cryptography"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1383388844934013954","@type":"Researcher","foaf:name":[{"@value":"Giuseppe Ateniese"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844934013952","@type":"Researcher","foaf:name":[{"@value":"Carlo Blundo"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844934013955","@type":"Researcher","foaf:name":[{"@value":"Alfredo De Santis"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844934013953","@type":"Researcher","foaf:name":[{"@value":"Douglas R. Stinson"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"03043975"}],"prism:publicationName":[{"@value":"Theoretical Computer Science"}],"dc:publisher":[{"@value":"Elsevier BV"}],"prism:publicationDate":"2001-01","prism:volume":"250","prism:number":"1-2","prism:startingPage":"143","prism:endingPage":"161"},"reviewed":"false","dc:rights":["https://www.elsevier.com/tdm/userlicense/1.0/","https://www.elsevier.com/open-access/userlicense/1.0/"],"url":[{"@id":"https://api.elsevier.com/content/article/PII:S0304397599001279?httpAccept=text/xml"},{"@id":"https://api.elsevier.com/content/article/PII:S0304397599001279?httpAccept=text/plain"}],"createdAt":"2002-07-25","modifiedAt":"2019-04-28","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050282812707738112","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Visual secret sharing schemes encrypting multiple images"}]},{"@id":"https://cir.nii.ac.jp/crid/1360004230711887616","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images"}]},{"@id":"https://cir.nii.ac.jp/crid/1360017282197309184","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Improved scheme and evaluation method for progressive visual cryptography"}]},{"@id":"https://cir.nii.ac.jp/crid/1360846639865421824","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"An Extended Visual Cryptography Scheme for Continuous-Tone Images"}]},{"@id":"https://cir.nii.ac.jp/crid/1360848656217186560","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Hiding a checkered-pattern carrier-screen image in a camouflaged halftone image"}]},{"@id":"https://cir.nii.ac.jp/crid/1360848656339163904","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"A proactive secret image sharing scheme with resistance to machine learning based steganalysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1390007757214491520","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Optimal Basis Matrices of a Visual Cryptography Scheme with Meaningful Shares and Analysis of Its Security"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282681288123776","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A Cheat-Prevention Visual Secret Sharing Scheme with Efficient Pixel Expansion"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572702283868288","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417124926874368","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Elliptic Curve Cryptosystem on Smart Card Access With Threshold Scheme"}]},{"@id":"https://cir.nii.ac.jp/crid/1571698602309372672","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"New Constructions of the Lattice-Based Visual Secret Sharing Scheme Using Mixture of Colors"}]},{"@id":"https://cir.nii.ac.jp/crid/1571698602535219968","@type":"Article","relationType":["isCitedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1016/s0304-3975(99)00127-9"},{"@type":"CIA","@value":"30006146445"},{"@type":"CROSSREF","@value":"10.1007/978-3-642-55046-1_2_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1587/transfun.2020dmp0010_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1186/s13635-022-00136-7_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1587/transfun.e96.a.2134_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1007/978-3-642-32205-1_19_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1007/s10043-014-0034-9_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1007/s11042-017-5097-8_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"},{"@type":"CROSSREF","@value":"10.1109/tifs.2017.2750104_references_DOI_NcasDdEXZCceMxUcCqGQlYQbDCi"}]}