{"created":"2023-05-15T11:03:57.107539+00:00","id":109,"links":{},"metadata":{"_buckets":{"deposit":"ad2f7dde-6d0b-48fe-b99c-2eaa5da352d2"},"_deposit":{"created_by":15,"id":"109","owners":[15],"pid":{"revision_id":0,"type":"depid","value":"109"},"status":"published"},"_oai":{"id":"oai:u-aizu.repo.nii.ac.jp:00000109","sets":["7"]},"author_link":["53","54","55","56"],"control_number":"109","item_10010_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2014","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"7395","bibliographicPageStart":"7391","bibliographic_titles":[{"bibliographic_title":"Proceedings of the 39th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014)","bibliographic_titleLang":"en"}]}]},"item_10010_description_19":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"PDF"}]},"item_10010_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Secret sharing is a method of generating multiple shares from secret information so that only a qualified set of shares can be employed to recover this secret information. Visual secret sharing (VSS) is an example of secret sharing; its decryption can be performed by using human eyes without a computer.This paper provides a formulation of encryption for multiple secret images, which is a generalization of the existing ones,and also a general method of constructing VSS schemes encrypting multiple secret images.","subitem_description_type":"Abstract"}]},"item_10010_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_10010_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"IEEE Xplore"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6855036","subitem_relation_type_select":"URI"}},{"subitem_relation_name":[{"subitem_relation_name_text":"IEEE Copyright Form"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.ieee.org/publications_standards/publications/rights/copyrightmain.html","subitem_relation_type_select":"URI"}}]},"item_10010_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"佐々木, 愛美","creatorNameLang":"ja"},{"creatorName":"ササキ, マナミ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"渡邊, 曜大","creatorNameLang":"ja"},{"creatorName":"ワタナベ, ヨウダイ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Sasaki, Manami","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Watanabe, Yodai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-07-29"}],"displaytype":"detail","filename":"icassp2014vss.pdf","filesize":[{"value":"230.8 kB"}],"format":"application/pdf","licensetype":"license_11","mimetype":"application/pdf","url":{"label":"国際会議予稿集1(渡邊)","url":"https://u-aizu.repo.nii.ac.jp/record/109/files/icassp2014vss.pdf"},"version_id":"474361d9-2068-48f3-bd6f-9236084dac69"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Visual secret sharing","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Information-theoretic security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Multiple secret images","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"other","resourceuri":"http://purl.org/coar/resource_type/c_1843"}]},"item_title":"Formulation of visual secret sharing schemes encrypting multiple images","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Formulation of visual secret sharing schemes encrypting multiple images","subitem_title_language":"en"}]},"item_type_id":"10010","owner":"15","path":["7"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2015-07-29"},"publish_date":"2015-07-29","publish_status":"0","recid":"109","relation_version_is_last":true,"title":["Formulation of visual secret sharing schemes encrypting multiple images"],"weko_creator_id":"15","weko_shared_id":-1},"updated":"2023-09-25T09:09:08.248766+00:00"}