G. C. Kessler, An overview of cryptography, 2003.

G. R. Blakley, Safeguarding cryptographic keys, Proc. of the National Computer Conference1979, vol.48, pp.313-317, 1979.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

M. Naor and A. Shamir, Visual cryptography, Workshop on the Theory and Application of of Cryptographic Techniques, pp.1-12, 1994.

C. Thien and J. Lin, Secret image sharing, Computers & Graphics, vol.26, issue.5, pp.765-770, 2002.

, An image-sharing method with user-friendly shadow images, IEEE Transactions on circuits and systems for video technology, vol.13, pp.1161-1169, 2003.

C. Lin and W. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and software, vol.73, issue.3, pp.405-414, 2004.

Y. Wu, C. Thien, and J. Lin, Sharing and hiding secret images with size constraint, Pattern Recognition, vol.37, issue.7, pp.1377-1385, 2004.

H. Tso, Sharing secret images using blakley's concept, Optical Engineering, vol.47, issue.7, pp.77-78, 2008.

M. Tsai and C. Chen, A study on secret image sharing, Proceedings of the 6th International Workshop on Image Media Quality and its Applications, 2013.

C. Chen, W. Fu, and C. Chen, A geometry-based secret image sharing approach, J. Inf. Sci. Eng, vol.24, issue.5, pp.1567-1577, 2008.