1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)
3. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)
4. Yang, C.N., Chang, W.J., Cai, S.R., Lin, C.Y.: Secret image sharing without keeping permutation key (2014)
5. Wu, X., Yang, C.N., Yang, Y.Y.: A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. J. Inf. Secur. Appl. 51, 102452 (2020)