References
- Ferdush J, Mondol G, Prapti AP, et al. An enhanced image encryption technique combining genetic algorithm and particle swarm optimization with chaotic function. Int J Comput Appl. 2019; 1–8. DOI: https://doi.org/10.1080/1206212x.2019.1662170.
- Ambika, Biradar RL, Burkpalli V. Encryption-based steganography of images by multiobjective whale optimal pixel selection. Int J Comput Appl. 2019; 1–10. DOI: https://doi.org/10.1080/1206212x.2019.1692442.
- Naor M, Shamir A. Visual cryptography. In: De Santis A. (eds) Advances in cryptology–EUROCRYPT 94. Berlin, Heidelberg: Springer; 1995. p. 1–12. DOI: https://doi.org/10.1007/bfb0053419.
- Divya A, Ramalakshmi K. Maintaining the secrecy in visual cryptography schemes. In 2011 IEEE 3rd International Conference on Electronics Computer Technology; 2011. DOI: https://doi.org/10.1109/icectech.2011.5941910.
- Liu F, Wu C, Lin X. A new definition of the contrast of visual cryptography scheme. Inf Process Lett. 2010;110(7):241–246. DOI: https://doi.org/10.1016/j.ipl.2010.01.003.
- Cimato S, Santis AD, Ferrara AL, et al. Ideal contrast visual cryptography schemes with reversing. Inf Process Lett. 2005;93(4):199–206. DOI: https://doi.org/10.1016/j.ipl.2004.10.011.
- Ibrahim DR, Abdullah R, Teh JS, et al. Authentication for ID cards based on colour visual cryptography and facial recognition. In Proceedings of the 3rd International Conference on Cryptography, Security and Privacy – ICCSP 19; ACM Press; 2019. DOI: https://doi.org/10.1145/3309074.3309077.
- Pawlak M, Poniszewska-Marańda A, Kryvinska N. Towards the intelligent agents for blockchain e-voting system. Proc Comput Sci. 2018;141:239–246. DOI: https://doi.org/10.1016/j.procs.2018.10.177.
- Ibjaoun S, Kalam AAE, Poirriez V, et al. Biometric template privacy using visual cryptography. In: Abraham A., Haqiq A., Muda A., Gandhi N. (eds) Advances in intelligent systems and computing. Springer International Publishing; 2018. Marrakech, Morocco, p. 309–317. DOI: https://doi.org/10.1007/978-3-319-76354-5_28.
- Lu J, Yang Z, Li L, et al. Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob Inf Syst. 2017;2017:1–12. DOI: https://doi.org/10.1155/2017/4356038.
- Roy DP. Attestation using visual cryptography (3,3) scheme. Int J Emerging Trends Eng Res. 2020;8(3):645–651. DOI: https://doi.org/10.30534/ijeter/2020/06832020.
- Gayathri R, Nagarajan V. Secure data hiding using steganographic technique with visual cryptography and watermarking scheme. In 2015 IEEE International Conference on Communications and Signal Processing (ICCSP); 2015. DOI: https://doi.org/10.1109/iccsp.2015.7322691.
- Attaby AA, Ahmed MFM, Alsammak AK. Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-m3. Ain Shams Eng J. 2018;9(4):1965–1974. DOI: https://doi.org/10.1016/j.asej.2017.02.003.
- Askari N, Heys HM, Moloney CR. An extended visual cryptography scheme without pixel expansion for halftone images. In 2013 IEEE 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE); 2013. DOI: https://doi.org/10.1109/ccece.2013.6567726.
- Geetha P, Jayanthi VS, Jayanthi AN. Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. Multimed Tools Appl. 2019;78(13):18503–18530. DOI: https://doi.org/10.1007/s11042-019-7163-x.
- Fu Z, Cheng Y, Yu B. Perfect recovery of XOR-based visual cryptography scheme. Multimed Tools Appl. 2018;78(2):2367–2384. DOI: https://doi.org/10.1007/s11042-018-6364-z.
- Al-Khalid RI, Al-Dallah RA, Al-Anani AM, et al. A secure visual cryptography scheme using private key with invariant share sizes. Journal of Software Engineering and Applications. 2017;10(1):1–10. DOI: https://doi.org/10.4236/jsea.2017.101001.
- Shankar K, Lakshmanaprabu SK. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol. 2018;7(1.9):22. DOI: https://doi.org/10.14419/ijet.v7i1.9.9729.
- Hou Y-C. Visual cryptography for color images. Pattern Recognit. 2003;36(7):1619–1629. DOI: https://doi.org/10.1016/s0031-3203(02)00258-3.
- Nagaraj S, Raju G, Rao KK. Image encryption using elliptic curve cryptography and matrix. Procedia Comput Sci. 2015;48:276–281. DOI: https://doi.org/10.1016/j.procs.2015.04.182.
- Shankar K, Eswaran P. A secure visual secret share (vss) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Aust J Basic Appl Sci. 2015;9(36):150–163.
- Shankar K, Eswaran P. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun. 2017;14(2):118–130. DOI: https://doi.org/10.1109/cc.2017.7868160.
- Shankar K, Eswaran P. A new k out of n secret image sharing scheme in visual cryptography. In IEEE 2016 10th International Conference on Intelligent Systems and Control (ISCO); 2016. DOI: https://doi.org/10.1109/isco.2016.7726969.
- Patel T, Srivastava R. A new technique for color share generation using visual cryptography. In 2016 IEEE International Conference on Inventive Computation Technologies (ICICT); 2016. DOI: https://doi.org/10.1109/inventive.2016.7824848.
- Rani MMS, Mary GG. Particle swarm optimization based image enhancement of visual cryptography shares. In: Huimin Lu, Yujie Li (Eds.) Artificial intelligence and computer vision. Springer International Publishing; 2016. p. 31–49. DOI: https://doi.org/10.1007/978-3-319-46245-5_3.
- Kar C, Kar SK, Banerjee S. An approach for visual cryptography scheme on color images. In: Kalam A., Das S., Sharma K. (eds) Lecture notes in electrical engineering. Singapore: Springer; 2017. p. 501–508. DOI: https://doi.org/10.1007/978-981-10-4765-7_53.
- Blesswin AJ, Raj C, Sukumaran R, et al. Enhanced semantic visual secret sharing scheme for the secure image communication. Multimed Tools Appl. 2020;79:17057-17079. DOI: https://doi.org/10.1007/s11042-019-7535-2.
- Chiu P-L, Lee K-H. Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process. 2019;165:233–249. DOI: https://doi.org/10.1016/j.sigpro.2019.06.038.
- Wang H, Xiao D, Li M. et al, A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 2019;155:218–232. DOI: https://doi.org/10.1016/j.sigpro.2018.10.001.
- Mafarja M, Heidari AA, Faris H, et al. Dragonfly algorithm: theory, literature review, and application in feature selection. In: Seyedali Mirjalili, Jin Song Dong, Andrew Lewis Nature (eds.) Nature-inspired optimizers. Springer International Publishing; 2019. p. 47–67. DOI: https://doi.org/10.1007/978-3-030-12127-3_4.
- Mirjalili S. Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput Appl. 2015;27(4):1053–1073. DOI: https://doi.org/10.1007/s00521-015-1920-1.
- Mafarja MM, Eleyan D, Jaber I, et al. Binary dragonfly algorithm for feature selection. In 2017 IEEE International Conference on New Trends in Computing Sciences (ICTCS); 2017. DOI: https://doi.org/10.1109/ictcs.2017.43.
- Virtual library of simulated experiments: test functions and datasets. Available from: https://www.sfu.ca/ssurjano/optimization.html.
- Yang X-S. A new metaheuristic bat-inspired algorithm. In: González J.R., Pelta D.A., Cruz C., Terrazas G., Krasnogor N. (eds) Nature inspired cooperative strategies for optimization (NICSO 2010); Berlin, Heidelberg: Springer; 2010. p. 65–74. DOI: https://doi.org/10.1007/978-3-642-12538-6_6.
- Kiran MS, Babalik A. Improved artificial bee colony algorithm for continuous optimization problems. J Comput Commun. 2014;2(4):108–116. DOI: https://doi.org/10.4236/jcc.2014.24015.
- Kirkpatrick S, Gelatt CD, Vecchi MP. Optimization by simulated annealing. Science. 1983;220(4598):671–680. DOI: https://doi.org/10.1126/science.220.4598.671.
- Yang X-S. Harmony search as a metaheuristic algorithm. In: Geem Z.W. (eds) Music-inspired harmony search algorithm. Berlin, Heidelberg: Springer; p. 1–14. DOI: https://doi.org/10.1007/978-3-642-00185-7_1.
- Atashpaz-Gargari E, Lucas C. Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition. In 2007 IEEE Congress on Evolutionary Computation; IEEE; 2007. DOI: https://doi.org/10.1109/cec.2007.4425083.
- Pham DT, Castellani M. A comparative study of the bees algorithm as a tool for function optimisation. Cogent Eng. 2(1). DOI: https://doi.org/10.1080/23311916.2015.1091540.
- Yang X-S. Firefly algorithms for multimodal optimization. In: Watanabe O., Zeugmann T. (eds) Stochastic algorithms: foundations and applications. Berlin, Heidelberg: Springer; 2009. p. 169–178. DOI: https://doi.org/10.1007/978-3-642-04944-6_14.
- Kennedy J, Eberhart R. Particle swarm optimization. In Proceedings of ICNN 95 – International Conference on Neural Networks; IEEE; DOI: https://doi.org/10.1109/icnn.1995.488968.
- Storn R, Price K. Differential evolution a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim. 1997;11(4):341–359. DOI: https://doi.org/10.1023/a:1008202821328.
- dos Reis Ribeiro M, de Aguiar MS. Cultural algorithms: a study of concepts and approaches. In 2011 IEEE Workshop-School on Theoretical Computer Science; IEEE; 2011. DOI: https://doi.org/10.1109/weit.2011.24.
- Mehrabian A, Lucas C. A novel numerical optimization algorithm inspired from weed colonization. Ecol Inform. 2006;1(4):355–366. DOI: https://doi.org/10.1016/j.ecoinf.2006.07.003.
- Binary dragonfly algorithm. Available from: https://www.mathworks.com/matlabcentral/fileexchange/51%20032-bda-binary-dragonfly-algorithm.
- Wu Y, Noonan JP. NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun. April Edition, 2011. pp. 31-38. http://www.cyberjournals.com/Papers/Apr2011/05.pdf.
- Nag A, Biswas S, Sarkar D, et al. Secret image sharing scheme based on a boolean operation. Cybern Inf Technol. 2014;14(2):98–113. DOI: https://doi.org/10.2478/cait-2014-0023.
- Ye R. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun. 2011;284(22):5290–5298. DOI: https://doi.org/10.1016/j.optcom.2011.07.070.