1. How to share a secret;Shamir;Communications of the ACM,1979
2. G.R. Blakley, Safeguarding cryptography keys, in: Proceedings of AFIPS 1979 National Computer Conference, vol. 48, New York, USA, 1979, pp. 313–317.
3. M. Naor, A. Shamir, Visual cryptography, in: Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes in Computer Science, vol. 950, Springer, Berlin, 1995, pp. 1–12.
4. Bit-level based secret sharing for image encryption;Lukac;Pattern Recognition,2005
5. M. Naor, B. Pinkas, Visual authentication and identification, in: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, California, USA, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, 1997, pp. 322–336.