An overview of cryptography, 2003. ,
Safeguarding cryptographic keys, Proc. of the National Computer Conference1979, vol.48, pp.313-317, 1979. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
Visual cryptography, Workshop on the Theory and Application of of Cryptographic Techniques, pp.1-12, 1994. ,
Secret image sharing, Computers & Graphics, vol.26, issue.5, pp.765-770, 2002. ,
, An image-sharing method with user-friendly shadow images, IEEE Transactions on circuits and systems for video technology, vol.13, pp.1161-1169, 2003.
Secret image sharing with steganography and authentication, Journal of Systems and software, vol.73, issue.3, pp.405-414, 2004. ,
Sharing and hiding secret images with size constraint, Pattern Recognition, vol.37, issue.7, pp.1377-1385, 2004. ,
Sharing secret images using blakley's concept, Optical Engineering, vol.47, issue.7, pp.77-78, 2008. ,
A study on secret image sharing, Proceedings of the 6th International Workshop on Image Media Quality and its Applications, 2013. ,
A geometry-based secret image sharing approach, J. Inf. Sci. Eng, vol.24, issue.5, pp.1567-1577, 2008. ,