[1] F. M. Aswad, I. Salman, S. A. Mostafa, An optimization of color halftone visual cryptography scheme based on Bat
algorithm, Journal of Intelligent Systems, 30(1) (2021), 816-835.
[2] H. Ayad, M. Khalil, Qam-dwt-svd based watermarking scheme for medical images, International Journal of Interac-
tive Multimedia and Arti cial Intelligence, (2018), 81-89.
[3] C. S. Baird, Absorption of electromagnetic radiation, AccessScience, 2019.
[4] J. Blesswin, M. Kumar, Secured communication method using visual secret sharing scheme for color images, Journal
of Internet Technology, 22(4) (2021), 803-810.
[5] C. Blundo, S. Cimato, A. De Santis, Visual cryptography schemes with optimal pixel expansion, Theoretical Com-
puter Science, 369(1-3) (2006), 169-182.
[6] N. Buckley, A. K. Nagar, S. Arumugam, On real-valued visual cryptographic basis matrices, Journal of Universal
Computer Science, 21(12) (2015), 1536-1562.
[7] B. Champagne, M. Guillaume, F. Zutterman, TDDFT investigation of the optical properties of cyanine dyes, Chem-
ical Physics Letters, 425(1-3) (2006), 105-109.
[8] J. Chandrasekaran, Chemistry of colours, Resonance, 6(3) (2001), 66-75.
[9] J. J. Chang, B. Y. Huang, J. S. Juan, A new visual multi-secrets sharing scheme by random grids, Cryptography,
2(3) (2018), 24.
[10] H. C. Chao, T. Y. Fan, Random-grid based progressive visual secret sharing scheme with adaptive priority, Digital
Signal Processing, 68 (2017), 69-80.
[11] H. C. Chao, T. Y. Fan, XOR-based progressive visual secret sharing using generalized random grids, Displays, 49
(2017), 6-15.
[12] H. C. Chao, T. Y. Fan, Generating random grid-based visual secret sharing with multi-level encoding, Signal
Processing: Image Communication, 57 (2017), 60-67.
[13] T. H. Chen, Y. S. Lee, C. H. Lin, On the diculty of aligning VSS random grids, Signal Processing: Image
Communication, 44 (2016), 101-107.
[14] P. L. Chiu, K. H. Lee, Ecient constructions for progressive visual cryptography with meaningful shares, Signal
Processing, 165 (2019), 233-249.
[15] S. Cimato, R. De Prisco, A. De Santis, Probabilistic visual cryptography schemes, The Computer Journal, 49(1)
(2006), 97-107.
[16] S. Cimato, R. De Prisco, A. De Santis, Colored visual cryptography without color darkening, Theoretical Computer
Science, 374(1-3) (2007), 261-276.
[17] M. A. Duraisamy, M. M. Sathiyamoorthy, M. S. Chandrasekar, Protection of privacy in visual cryptography scheme
using error di usion technique, International Journal of Computer Science and Network, 2(2) (2013).
[18] P. A. Eisen, D. R. Stinson, Threshold visual cryptography schemes with speci ed whiteness levels of reconstructed
pixels, Designs, Codes and Cryptography, 25(1) (2002), 15-61.
[19] R. Franzen, Kodak lossless true color image suite, http : / / r0k . us / graphics / kodak. (accessed:08.30.2023).
[20] A. Giri, Development of digital half toning techniques for Grayscale image, PhD thesis, 2014.
[21] M. Gupta, et al., An ecient image encryption technique based on two-level security for internet of things, Multi-
media Tools and Applications, 82(4) (2023), 5091-5111.
[22] C. Hegde, et al., Secure authentication using image processing and visual cryptography for banking applications,
2008 16th International Conference on Advanced Computing and Communications, (2008), 65-72.
[23] A. Hore, D. Ziou, Image quality metrics: PSNR vs. SSIM, 2010 20th International Conference on Pattern Recog-
nition, (2010), 2366-2369.
[24] Y. C. Hou, Visual cryptography for color images, Pattern Recognition, 36(7) (2003), 1619-1629.
[25] H. Hu, et al., General construction for XOR-based visual cryptography and its extended capability, Multimedia
Tools and Applications, 75 (2016), 13883-13911.
[26] B. Hu, et al., Subjective and objective quality assessment for image restoration: A critical survey, Signal Processing:
Image Communication, 85 (2020), 115839.
[27] O. Kafri, E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, 12(6) (1987), 377-379.
[28] Y. Kang, et al., Visual cryptography based on ghost imaging and Hadamard transform, Quantum Information
Processing, 22(2) (2023), 116.
[29] S. Kumar, R. Sharma, Improving contrast in random grids based visual secret sharing, International Journal of
Security and Its Applications, 6(1) (2012), 9-28.
[30] P. Li, et al., A construction method of (2, 3) visual cryptography scheme, IEEE Access, 8 (2020), 32840-32849.
[31] C. C. Lin, W. H. Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition
Letters, 24(1-3) (2003), 349-358.
[32] Z. Liu, et al., Weighted visual secret sharing for general access structures based on random grids, Signal Processing:
Image Communication, 92 (2021), 116129.
[33] N. A. E. S. Mohamed, A. Youssif, H. A. G. El-Sayed, Fast and robust image encryption scheme based on quantum
logistic map and hyperchaotic system, Complexity, 2022 (2022). DOI: 10.1155/2022/3676265.
[34] P. Mohammadi, A. Ebrahimi Moghadam, S. Shirani, Subjective and objective quality assessment of image: A
survey, arXiv preprint arXiv:1406.7799, (2014).
[35] M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology{EUROCRYPT'94: Workshop on the Theory
and Application of Cryptographic Techniques Perugia, Italy, May 9{12, 1994 Proceedings 13. Springer, (1995), 1-12.
[36] J. S. Pan, et al., Visual cryptography scheme for secret color images with color QR codes, Journal of Visual
Communication and Image Representation, 82 (2022), 103405.
[37] C. S. Sanaboina, S. R. Odugu, G. Vanamadi, Secret image sharing using visual cryptography shares with acknowl-
edgment, International Journal of Innovative Technology and Exploring Engineering, 8(11) (2019), 3474-3481.
[38] U. Sara, M. Akter, M. S. Uddin, Image quality assessment through FSIM, SSIM, MSE and PSNR{a comparative
study, Journal of Computer and Communications, 7(3) (2019), 8-18.
[39] D. R. I. M. Setiadi, PSNR vs SSIM: Imperceptibility quality assessment for image steganography, Multimedia Tools
and Applications, 80(6) (2021), 8423-8444.
[40] G. Shen, et al., Perfect contrast XOR-based visual cryptography schemes via linear algebra, Designs, Codes and
Cryptography, 85 (2017), 15-37.
[41] H. Shi, et al., A robust and secure zero-watermarking copyright authentication scheme based on visual cryptography
and block GH feature, Multimedia Tools and Applications, 81(26) (2022), 38019-38051.
[42] S. J. Shyu, Image encryption by random grids, Pattern Recognition, 40(3) (2007), 1014-1031.
[43] S. J. Shyu, Image encryption by multiple random grids, Pattern Recognition, 42(7) (2009), 1582-1596.
[44] S. J. Shyu, M. C. Chen, Minimizing pixel expansion in visual cryptographic scheme for general access structures,
IEEE Transactions on Circuits and Systems for Video Technology, 25(9) (2015), 1557-1561.
[45] P. Singh, B. Raman, Reversible data hiding based on Shamir's secret sharing for color images over cloud, Informa-
tion Sciences, 422 (2018), 77-97.
[46] USC University of Southern California. The USC-SIPI Image Database. url: http://sipi.usc.edu/database. (ac-
cessed: 08.30.2023).
[47] Z. Wang, et al., Image quality assessment: From error visibility to structural similarity, IEEE Transactions on
Image Processing, 13(4) (2004), 600-612.
[48] Z. Wang, G. R. Arce, G. Di Crescenzo, Halftone visual cryptography via error di usion, IEEE Transactions on
Information Forensics and Security, 4(3) (2009), 383-396.
[49] D. S. Wang, et al., Optimal contrast grayscale visual cryptography schemes with reversing, IEEE Transactions on
Information Forensics and Security, 8(12) (2013), 2059-2072.
[50] D. S. Wang, F. Yi, X. Li, Probabilistic visual secret sharing schemes for grey-scale images and color images,
Information Sciences, 181(11) (2011), 2189-2208.
[51] G. Wei, Some similarity measures for picture fuzzy sets and their applications, Iranian Journal of Fuzzy Systems,
15(1) (2018), 77-89.
[52] X. Wu, Z. R. Lai, Random grid based color visual cryptography scheme for black and white secret images with
general access structures, Signal Processing: Image Communication, 75 (2019), 100-110.
[53] X. Wu, W. Sun, Improving the visual quality of random grid-based visual secret sharing, Signal Processing, 93(5)
(2013), 977-995.
[54] X. Wu, W. Sun, Extended capabilities for XOR-based visual cryptography, IEEE Transactions on Information
Forensics and Security, 9(10) (2014), 1592-1605.
[55] X. Wu, C. N. Yang, Invertible secret image sharing with steganography and authentication for AMBTC compressed
images, Signal Processing: Image Communication, 78 (2019), 437-447.
[56] X. Wu, C. N. Yang, Probabilistic color visual cryptography schemes for black and white secret images, Journal of
Visual Communication and Image Representation, 70 (2020), 102793.
[57] C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, 25(4)
(2004), 481-494.
[58] C. N. Yang, T. S. Chen, Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion, Pattern
Recognition Letters, 26(2) (2005), 193-206.
[59] C. N. Yang, C. C. Wang, T. S. Chen, Visual cryptography schemes with reversing, The Computer Journal, 51(6)
(2008), 710-722.
[60] C. N. Yang, Y. Y. Yang, On the analysis and design of visual cryptography with error correcting capability, IEEE
Transactions on Circuits and Systems for Video Technology, 31(6) (2020), 2465-2479.
[61] L. A. Zadeh, Fuzzy sets, Information and Control, 8(3) (1965), 338-353.
[62] D. Zhang, et al., HP-VCS: A high-quality and printer-friendly visual cryptography scheme, Journal of Visual
Communication and Image Representation, 78 (2021), 103186.