Citation: Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan. Weighted visual secret sharing with multiple decryptions and lossless recovery[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287
[1] | Z.M. Yaseen, S.O. Sulaiman, R.C. Deo, et al., An enhanced extreme learning machine model for river flow forecasting: State-of-the-art, practical applications in water resource engineering area and future research direction, J. Hydrology, 569 (2019), 387–408. |
[2] | A. Baghban, A. Jalali, M. Shafiee, et al., Developing an anfis-based swarm concept model for estimating the relative viscosity of nanofluids, Eng. Appl. Comput. Fluid Mech., 13 (2019), 26–39. |
[3] | C. Chuntian and K.W. Chau, Three-person multi-objective conflict decision in reservoir flood control, Euro. J. Operational Res., 142 (2002), 625–631. |
[4] | S. Samadianfard, A. Majnooni-Heris, S.N. Qasem, et al., Daily global solar radiation modeling using data-driven techniques and empirical equations in a semi-arid climate, Eng. Appl. Comput. Fluid Mech., 13 (2019) 142–157. |
[5] | C. Wu and K. Chau, Rainfall-runoff modeling using artificial neural network coupled with singular spectrum analysis, J. Hydrology, 399 (2011), 394–409. |
[6] | R.Moazenzadeh, B.Mohammadi, S.Shamshirband, etal., Couplingafireflyalgorithmwithsupport vector regression to predict evaporation in northern iran, Eng. Appl. Comput. Fluid Mech., 12 (2018), 584–597. |
[7] | M. Naora and A. Shamir, Visual cryptography, Advances in Cryptology-EUROCRYPT'94, Italy: Springer, (1994), 1–12. |
[8] | J. Weir and W. Yan, A comprehensive study of visual cryptography, In: Transactions on DHMS V, LNCS 6010, Berlin: Springer, (2010), 70–105. |
[9] | X. Yan, S. Wang, A.A.A. El-Latif, et al., Visual secret sharing based on random grids with abilities of and xor lossless recovery, Mult. Tools Appl., 74 (2015), 3231–3252. |
[10] | C.N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognit. Lett., 25 (2004), 481–494. |
[11] | S. Cimato, R. De Prisco and A. De Santis, Probabilistic visual cryptography schemes, Comp. J., 49 (2006), 97–107. |
[12] | D. Wang, L. Zhang, N. Ma, et al., Two secret sharing schemes based on boolean operations, Pattern Recognit., 40 (2007), 2776–2785. |
[13] | Z. Wang, G.R. Arce and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Security, 4 (2009), 383–396. |
[14] | P. Li, P.J. Ma, X.H. Su, et al., Improvements of a two-in-one image secret sharing scheme based on gray mixing model, J. Visual Commun. Image Representation, 23 (2012), 441–453. |
[15] | X. Yan, S. Wang, A.A.A. El-Latif, et al., Random grids-based visual secret sharing with improved visual quality via error diffusion, Mult. Tools Appl., 74 (2015), 9279–9296. |
[16] | S. J. Horng, S. F. Tzeng, Y. Pan, et al., b-specs+: Batch verification for secure pseudonymous authentication in vanet, IEEE Trans. Inform. Forensics Security 8 (2013), 1860–1875. |
[17] | H. Ayad and M. Khalil, Qam-dwt-svd based watermarking scheme for medical images, Int. J. Interactive Mult. Artificial Intelligence, 5 (2018), 81–89. |
[18] | F. Lopez, L. Valentn and I. Sarra, Detecting image brush editing using the discarded coefficients and intentions, Int. J. Interactive Mult. Artificial Intelligence InPress, 2018. |
[19] | R. Ito, H. Kuwakado and H. Tanaka, Image size invariant visual cryptography, IEICE Trans. Fundamentals Electronics, Commun. Comp. Sci., 82 (1999), 2172–2177. |
[20] | O. Kafri and E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, 12 (1987), 377–379. |
[21] | P. Tuyls, H.D. Hollmann, J.H. Van Lint, et al., Xor-based visual cryptography schemes, Designs Codes Cryptography, 37 (2005), 169–186. |
[22] | X. Wu and W. Sun, Random grid-based visual secret sharingwith abilities of or and xor decryptions, J. Visual Commun. Image Representation, 24 (2013), 48–62. |
[23] | X. Yan, S. Wang, X. Niu, et al., Random grid-based visual secret sharing with multiple decryptions, J. Visual Comm. Image Representation, 26 (2015), 94–104. |
[24] | Y.C. Hou, Z.Y. Quan and C.F. Tsai, A privilege-based visual secret sharing model, J. Visual Comm. Image Representation, 33 (2015), 385–367. |
[25] | C.N. Yang, J.K. Liao and D.S. Wang, New privilege-based visual cryptography with arbitrary privilege levels, J. Visual Comm. Image Representation 42 (2017), 121–131. |
[26] | T.Y. Fan and H.C. Chao, Random-grid based progressive visual secret sharing scheme with adaptive priority, Digital Signal Process., 68 (2017), 69–80. |
[27] | X.H. Yan and Y.L. Lu, Progressive visual secret sharing for general access structure with multiple decryptions, Mult. Tools Appl., 77 (2017), 1–20. |
[28] | X. Wu, T. Liu and W. Sun, Improving the visual quality of random grid-based visual secret sharing via error diffusion, J. Visual Comm. Image Representation, 24 (2013), 552–566. |