[1. Blakely, G. R. Safeguarding Cryptographic Keys. – Proc. AFIPS, Vol. 48, 1979, pp. 313-317.10.1109/MARK.1979.8817296]Search in Google Scholar
[2. Shamir, A. How to Share a Secret. – Communications of the ACM, Vol. 22, 1979, No 11, pp. 612-613.10.1145/359168.359176]Search in Google Scholar
[3. Thien, C. C., J. C. Lin. Secret Image Sharing. – Computers & Graphics, Vol. 26, 2002, No 5, pp. 765-770.10.1016/S0097-8493(02)00131-0]Search in Google Scholar
[4. Lin, C. C., W. H. Tsai. Secret Image Sharing with Steganography and Authentication. – Journal of Systems and Software, Vol. 73, 2004, No 3, pp. 405-414.10.1016/S0164-1212(03)00239-5]Search in Google Scholar
[5. Wang, R. Z., C. H. Su. Secret Image Sharing with Smaller Shadow Images. – Pattern Recognition Letters, Vol. 27, 2006, No 6, pp. 551-555.10.1016/j.patrec.2005.09.021]Search in Google Scholar
[6. Chang, C. C., C. C. Lin, C. H. Lin, Y. H. Chen. A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images. – Information Sciences, Vol. 178, 2008, No 11, pp. 2433-2447.10.1016/j.ins.2007.12.016]Search in Google Scholar
[7. Tsai, D. S., G. Horng, T. H. Chen, Y. T. Huang. A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint. – Information Sciences, Vol. 179, 2009, No 19, pp. 3247-3254.10.1016/j.ins.2009.05.020]Search in Google Scholar
[8. Naor, M., A. Shamir. Visual Cryptography. – In: Advances in Cryptography Eurocrypt’94. Lecture Notes in Computer Science. Vol. 950. Springer-Verlag, 1995, pp. 1-12.10.1007/BFb0053419]Search in Google Scholar
[9. Ateniese, G., C. Blundo, A. De Santis, D. R. Stinson. Extended Capabilities for Visual Cryptography. – Theoretical Computer Science, Vol. 250, 2001, No 1, pp. 143-161.10.1016/S0304-3975(99)00127-9]Search in Google Scholar
[10. Tsai, D. S., T. H. Chen, G. Horng. A Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Secret Images. – Pattern Recognition, Vol. 40, 2007, No 8, pp. 2356-2366.10.1016/j.patcog.2007.01.013]Search in Google Scholar
[11. Lin, C. C., W. H. Tsai. Visual Cryptography for Gray-Level Images by Dithering Techniques. – Pattern Recognition Letters, Vol. 24, 2003, No 1, pp. 349-358.10.1016/S0167-8655(02)00259-3]Search in Google Scholar
[12. Blundo, C., A. De Santis, M. Naor. Visual Cryptography for Grey Level Images. – Information Processing Letters, Vol. 75, 2000, No 6, pp. 255-259.10.1016/S0020-0190(00)00108-3]Search in Google Scholar
[13. Hou, Y. C. Visual Cryptography for Color Images. – Pattern Recognition, Vol. 36, 2003, No 7, pp. 1619-1629.10.1016/S0031-3203(02)00258-3]Search in Google Scholar
[14. Wang, D., L. Zhang, N. Ma, X. Li. Two Secret Sharing Schemes Based on Boolean Operations. – Pattern Recognition, Vol. 40, 2007, No 10, pp. 2776-2785.10.1016/j.patcog.2006.11.018]Search in Google Scholar
[15. Chen, C. C., C. C. Chen, Y. C. Lin. Weighted Modulated Secret Image Sharing Method. – Journal of Electronic Imaging, Vol. 18, 2009, No 4, pp. 043011-043011.10.1117/1.3268362]Search in Google Scholar
[16. Li, P., C. N. Yang, C. C. Wu, Q. Kong, Y. Ma. Essential Secret Image Sharing Scheme with Different Importance of Shadows. – Journal of Visual Communication and Image Representation, Vol. 24, 2013, No 7, pp.1106-1114.10.1016/j.jvcir.2013.07.005]Search in Google Scholar
[17. Nag, A., S. Biswas, D. Sarkar, P. P. Sarka. Secret Image Sharing Scheme Based on a Boolean Operation. – Cybernetics and Information Technologies, Vol. 14, 2014, No 2, pp. 98-113.10.2478/cait-2014-0023]Search in Google Scholar
[18. Chang, C. C., C. C. Lin, T. H. N. Le, H. B. Le. Sharing a Verifiable Secret Image Using Two Shadows. – Pattern Recognition, Vol. 42, 2009, No 11, pp. 3097-3114.10.1016/j.patcog.2009.04.012]Search in Google Scholar
[19. Liu, H., X. Wang. Image Encryption Using DNA Complementary Rule and Chaotic Maps. – Applied Soft Computing, Vol. 12, 2012, No 5, pp. 1457-1466.10.1016/j.asoc.2012.01.016]Search in Google Scholar
[20. Zhu, C. A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences. – Optics Communications, Vol. 285, 2012, No 1, pp. 29-37.10.1016/j.optcom.2011.08.079]Search in Google Scholar
[21. Chen, T. H., C. S. Wu. Efficient Multi-Secret Image Sharing Based on Boolean Operations. – Signal Processing, Vol. 91, 2011, No 1, pp. 90-97.10.1016/j.sigpro.2010.06.012]Search in Google Scholar
[22. Verma, M., R. Rani. Strong Thershold Secret Image Sharing Based on Boolean Operation. – In: Proc. of International Conference on Computing, Communication and Automation (ICCCA’16), IEEE, 2016, pp. 1145-1149.10.1109/CCAA.2016.7813889]Search in Google Scholar
[23. Thomos, N., N. V. Boulgouris, M. G. Strintzis. Optimized Transmission of JPEG2000 Streams over Wireless Channels. – IEEE Transactions on Image Processing, Vol. 15, 2006, No 1.10.1109/TIP.2005.860338]Search in Google Scholar
[24. Xiangjun, L., C. Jianfei. Robust Transmission of JPEG2000 Encoded Images over Packet Loss Channels. – ICME, School of Computer Engineering, Nanyang Technological University, 2007, pp. 947-950.]Search in Google Scholar