REFERENCES
- Blakley, G. R. Safeguarding cryptographic keys, Proc. American Federation of Information Processing Societies Conf., Montvale, NJ, USA, 1979, 313–317.
- Shamir, A. How to share a secret. Commun. ACM, 22, 1979, 612–613.
- Chang, C. C., Tsai, C. S. and Chen, T. S. A new scheme for sharing secret color images in computer network. Int. Conf. on Parallel and Distributed Systems (ICPADS ’2000), Iwate, Japan, July 2000, 601–604.
- Tso, R. A study on secret sharing schemes and their application to identity-based key agreement schemes. Phd thesis, Graduate School of Systems and Information Engineering, University of Tsukuba, Japan, March 2006.
- Chang, C. C., and Hwang, R. J. Sharing secret images using shadow codebooks. Inform. Sci., 111, 1998, 335–345.
- Thien, C. C. and Lin, J. C. Secret image sharing. Comput. Graph., 26, 2002, 765–770.
- Lin, C. C. and Tsai, W. H. Secret multimedia information sharing with data hiding capacity by simple logic operations. Proc. 5th World Multi-conferences on Systemics, Cybernetics, and Informatics; and 7th Int. Conf. on Information Systems, analysis, and Synthesis, 1, Orlando, Florida, U.S.A., July 2001, 50–55.