References
- Blundo C, De Santis A, Naor M. Visual cryptography for grey level images. Inf Process Lett. 2000;75(6):255–259. doi: https://doi.org/10.1016/S0020-0190(00)00108-3
- MacPherson L. Grey level visual cryptography for general access structures [Master's thesis]. Waterloo (Canada): University of Waterloo; 2002.
- Zhou Z, Arce GR, Di Crescenzo G. Halftone visual cryptography. Transactions on Image Processing¡/DIFdel¿IEEE Trans Image Process. 2006;15(8):2441–2453. doi: https://doi.org/10.1109/TIP.2006.875249
- Hou Y-C. Visual cryptography for color images. Pattern Recognit. 2003;36(7):1619–1629. doi: https://doi.org/10.1016/S0031-3203(02)00258-3
- Mhala NC, Jamal R, Pais AR. Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Proc.. 2017;12(3):422–431. doi: https://doi.org/10.1049/iet-ipr.2017.0759
- Hou Y-C, Quan Z-Y, Tsai C-F, et al. Block-based progressive visual secret sharing. Inf Sci. 2013;233:290–304. doi: https://doi.org/10.1016/j.ins.2013.01.006
- Yan B, Xiang Y, Hua G. Improving visual quality for probabilistic and random grid schemes. In: Improving Image Quality in Visual Cryptography. Springer; 2020, p. 75–95.
- CUDA Zone — NVIDIA Developer. 2020 (accessed June 10, 2020) https://developer.nvidia.com/cuda-zone.
- Yan X, Lu Y. Generalized general access structure in secret image sharing. J Vis Commun Image Represent. 2019;58:89–101. doi: https://doi.org/10.1016/j.jvcir.2018.11.031
- Kabirirad S, Eslami Z. Improvement of (n,n)-multi-secret image sharing schemes based on boolean operations. J Inf Secur Appl. 2019;47:16–27.
- Kafri O, Keren E. Encryption of pictures and shapes by random grids. Letters¡/DIFdel¿Opt Lett. 1987;12(6):377–379.
- Shyu SJ. Image encryption by multiple random grids. Pattern Recognit. 2009;42(7):1582–1596. doi: https://doi.org/10.1016/j.patcog.2008.08.023
- Yan X, Liu X, Yang C-N. An enhanced threshold visual secret sharing based on random grids. J Real-time Image Proc. 2018;14(1):61–73. doi: https://doi.org/10.1007/s11554-015-0540-4
- Huang B-Y, Juan JS-T. Flexible meaningful visual multi-secret sharing scheme by random grids. Multimed Tools Appl. 2020;79:1–25. doi: https://doi.org/10.1007/s11042-019-7523-6
- Naor M, Shamir A. Visual cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer; 1994. p. 1–12.
- Hou Y-C, Quan Z-Y. Progressive visual cryptography with unexpanded shares. IEEE Trans Circuits Syst Video Technol. 2011;21(11):1760–1764. doi: https://doi.org/10.1109/TCSVT.2011.2106291
- Ateniese G, Blundo C, De Santis A, et al. Visual cryptography for general access structures. Inf Comput. 1996;129(2):86–106. doi: https://doi.org/10.1006/inco.1996.0076
- Ateniese G, Blundo C, De Santis A, et al. Extended capabilities for visual cryptography. Theor Comput Sci. 2001;250(1–2):143–161. doi: https://doi.org/10.1016/S0304-3975(99)00127-9
- Kanakkath P, Madathil S, Krishnan R. Deterministic extended visual cryptographic schemes for general access structures with or-and and xor-and operations. Multimed Tools Appl. 2019;78(2):1315–1344. doi: https://doi.org/10.1007/s11042-018-6158-3
- Chen T-H, Tsao K-H. Threshold visual secret sharing by random grids. J Syst Softw. 2011;84(7):1197–1208. doi: https://doi.org/10.1016/j.jss.2011.02.023
- Bassirian R, Boreiri S, Karimipour V. Computing on quantum shared secrets for general quantum access structures. Quantum Inf Proc. 2019; 18(4):109. doi: https://doi.org/10.1007/s11128-019-2224-7
- Suma D. Pipelined parallel rotational visual cryptography (pprvc). In: 2019 International Conference on Communication and Signal Processing (ICCSP). Melmaruvathur (Chennai): IEEE; 2019. p. 0109–0113.
- Mhala NC, Pais AR. Contrast enhancement of progressive visual secret sharing (pvss) scheme for gray-scale and color images using super-resolution. Signal Proc. 2019;162:253–267. doi: https://doi.org/10.1016/j.sigpro.2019.04.023
- Srujana OS, Mhala NC, Pais AR. Secure transmission of hyperspectral images. In: Third ISEA Conference on Security and Privacy (ISEA-ISAP). Guwahati: IEEE; 2020. p. 94–99.
- Hou Y-C, Lin C, Chang C-Y. Visual cryptography for color images without pixel expansion. J Technol. 2001;16(4):595–603.
- Gujjunoori S, Amberker B. Dct based reversible data embedding for mpeg-4 video using hvs characteristics. J Inf Secur Appl. 2013;18(4):157–166.
- Gujjunoori S, Amberker B. “Busyembed: an hvs based reversible data embedding scheme for video using dct,” IET; 2013.
- Chang C-C, Lin C-C, Tseng C-S, et al. Reversible hiding in dct-based compressed images. Inf Sci. 2007;177(13):2768–2786. doi: https://doi.org/10.1016/j.ins.2007.02.019
- Xiong Z, Orchard MT, Ramchandran K. Inverse halftoning using wavelets. Transactions on Image Processing¡/DIFdel¿IEEE Trans Image Process. 1999;8(10):1479–1483. doi: https://doi.org/10.1109/83.791977
- SIPI Image Database, 1999 (accessed June 10, 2020) sipi.usc.edu/database/database.php?volume=misc?.
- Index of / ychou/BPVSS, 2012 (accessed June 10, 2020) mail.im.tku.edu.tw/ychou/BPVSS/.