1. Xia Guangsheng and Yang Yixian. A new technology for key sharing. Journal of Beijing University of Posts and Telecommunications, 22(1993)1, 57–61 (in Chinese). 夏光升, 杨义先. 一种新的密钥分享技术. 北京邮电大学学报, 22(1993)1, 57–61.
2. Niu Dongmei. Study on visual cryptography schemes with covert image. [Master Dissertation], Southwest Jiaotong University, 2007 (in Chinese). 牛冬梅. 具有掩盖图像的可视密码方案研究. [硕士学位论文], 西南交通大, 2007.
3. M. Noar and A. Shamir. Visual cryptography. Advances in Cryptology-Eurocrypt’94, Springer-Verlag, Berlin, 1995, 1–12.
4. H. Y. Kim and R. L. de Queiroz. Alteration-locating authentication watermarking for binary images. Lecture Notes in Computer Science, Vol.3304, 2004, 125–136.
5. W. Stalling, et al., Principle and Practice of Cryptography and Network Security. 2nd ed., the United States of America, 2001, 377–398.