[1] Naor M. Perugia, Italy. Heidelberg:, Springer, 1-12(1994).
[2] Lin C, Shen X J, Lei M et al. Optical security validation based on orthogonal polarization multiplexing in three-dimensional space[J]. Acta Optica Sinica, 36, 0307001(2016).
[3] Sun X K, Zhang S G, Ma R et al. Natural speckle-based watermarking with random-like illuminated decoding[J]. Optics Express, 28, 31832-31843(2020).
[4] Melkemi M, Hammoudi K. Voronoi-based image representation applied to binary visual cryptography[J]. Signal Processing: Image Communication, 87, 115913(2020).
[5] Shi Y S, Yang X B. Invisible visual cryptography[J]. Chinese Physics Letters, 34, 114204(2017).
[6] Shi Y S, Yang X B. Optical hiding with visual cryptography[J]. Journal of Optics, 19, 115703(2017).
[7] Li Z F, Dong G Y, Yang D Y et al. Efficient dielectric metasurface hologram for visual-cryptographic image hiding[J]. Optics Express, 27, 19212-19217(2019).
[8] Yang N, Gao Q K, Shi Y S. Visual-cryptographic image hiding with holographic optical elements[J]. Optics Express, 26, 31995-32006(2018).
[9] Yang X B, Li T, Shi Y S. Indirect visual cryptography scheme[J]. Proceedings of SPIE, 9675, 96752Q(2015).
[10] Yu T, Yang D Y, Ma R et al. Enhanced-visual-cryptography-based optical information hiding system[J]. Acta Physica Sinica, 69, 144202(2020).
[11] Wang H J, Zhao T F, Shang D L et al[J]. Non-expanded (2, 2) visual cryptography scheme with masked image Journal of Nanjing University (Natural Science Edition), 2018, 157-162.
[12] Gan M, Gan Z, Chen K F. A visual secret sharing scheme with covert image[J]. Computer Applications and Software, 22, 1-2,88(2005).
[13] Fu Z X, Yu B, Fang L G. Operation-based multi-secret visual cryptography scheme with disguised patterns[J]. Computer Science, 38, 90-92(2011).
[14] Ulutas M. Meaningful share generation for increased number of secrets in visual secret-sharing scheme[J]. Mathematical Problems in Engineering, 2010, 593236(2010).
[15] Kumari K, Bhatia S. Multi-pixel visual cryptography for color images with meaningful shares[J]. International Journal of Engineering Science and Technology, 2, 2398-2407(2010).
[17] Yamamoto H, Hayasaki Y, Nishida N. Secure information display with limited viewing zone by use of multi-color visual cryptography[J]. Optics Express, 12, 1258-1270(2004).
[18] Sudharsanan S I. Visual cryptography for JPEG color images[J]. Proceedings of SPIE, 5601, 171-178(2004).
[19] Blundo C, Bonis A D, Santis A D. Improved schemes for visual cryptography[J]. Designs, Codes and Cryptography, 24, 255-278(2001).
[20] Cimato S, Prisco R D, Santis A D. Optimal colored threshold visual cryptography schemes[J]. Designs, Codes and Cryptography, 35, 311-335(2005).
[21] Niu D M[J]. 2, 2) visual cryptography schemes based halftoning Network & Computer Security, 2009, 53-54.
[22] Hou Y C. Visual cryptography for color images[J]. Pattern Recognition, 36, 1619-1629(2003).
[23] Yamamoto H, Hayasaki Y, Nishida N. Securing information display by use of visual cryptography[J]. Optics Letters, 28, 1564-1566(2003).
[25] Wang F H, Yen K K, Jain L C et al. Multiuser-based shadow watermark extraction system[J]. Information Sciences, 177, 2522-2532(2007).
[27] Qiao M Q, Zhao Z Z. Variable visual cryptography[J]. Journal of Cryptologic Research, 7, 48-55(2020).
[28] Cai C. Design and application of scope anti-shake system[D]. Harbin: Harbin Institute of Technology(2008).
[29] Wang X Y. Design and realization of the image stabilizing system for telescope[D]. Harbin: Harbin Institute of Technology(2007).
[30] Wu M, Tang E, Lin B. Data hiding in digital binary image[C]∥1st IEEE International Conference on Multimedia and Expo (ICME2000), July 30--August 2, New York, USA., 393-396.
[31] Su Z M, Lin X L. The arbitrary share of visual secrets[J]. Chinese Journal of Computers, 19, 293-299(1996).