1. Lecture Notes in Computer Science;G. Álvarez,2005
2. Blakley, G.R.: Safeguarding cryptographic keys. AFIPS Conf. Proc. 48, 313–317 (1979)
3. Chaudhuri, P., Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive cellular automata. In: Theory and Applications, vol. 1, IEEE Computer Society Press, Los Alamitos (1997)
4. Chang, C., Hwang, R.: Sharing secret images using shadow codebooks, Inform. Sciences 111, 335–345 (1998)
5. Chen, Y., Chan, Y., Huang, Ch., Tsai, M., Chu, Y.: A multiple-level visual secret-sharing scheme without image size expansion. Inform. Sciences 177, 4696–4710 (2007)