REFERENCES
- Shamir, A. How to share a secret. Commun. ACM, 1979, 22, 612–613.
- Naor, M. and Pinkas, B. Visual authentication and identification, Proc. Conf. CRYPTO ‘97, Santa Barbara, CA, USA, August 1997, IACR, pp. 322–336.
- Naor, M. and Shamir, A. In Advances in Cryptology – Eurocrypt ’94 (Ed. A. de Santis), 1995, Vol. 950 of Lecture Notes in Computer Science, pp.1–12 (Springer Verlag, Berlin).
- Ateniese, G., Blundo, C., de Santis, A. and Sinson, D. R. Extended capabilities for visual cryptography. Theor. Comput. Sci., 2001, 250, 143–161.
- Lukac, R., Plataniotis, K. N., Smolka, B. and Venetsanopoulos, A. N. A new approach to color image secret sharing, Proc. XII Eur. Signal Processing Conf.: EUSIPCO-2004, Vienna, Austria, September 2004, Institute of Communications and Radio Frequency Engineering, pp. 1493–1496.
- Lukac, R. and Plataniotis, K. N. A color image secret sharing scheme satisfying the perfect reconstruction property, Proc. 2004 Int. Workshop on Multimedia signal processing: MMSP ’04, Sienna, Italy, September- October 2004, IEEE, pp. 351–354.
- Tsai, C. S., Chang, C. C. and Chen, T. S. Sharing multiple secret in digital images. J. Syst. Software, 2002, 64, 163–170.
- Chen, J., Chen, T. S., Hsu, H. C. and Chen, H. W. New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electron. Imag., 2005, 14, 033018.