1. [1] S. Droste, “New results on visual cryptography,” Advances in Cryptology — CRYPT'96, Lecture Notes in Computer Science, vol.1109, pp.401-415, Springer, Berlin, Heidelberg, 1996. 10.1007/3-540-68697-5_30
2. [2] GNU Image Manipulation Program (GIMP), https://www.gimp.org/
3. [3] M. Iwamoto, “A weak security notion for visual secret sharing schemes,” IEEE Trans. Inf. Forensics Security, vol.7, no.2, pp.372-382, 2012. 10.1109/tifs.2011.2170975
4. [4] M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro, and K. Ohta, “Visual secret sharing schemes for multiple secret images allowing the rotation of shares,” IEICE Trans. Fundamentals, vol.E89-A, no.5, pp.1382-1395, May 2006.
5. [5] T. Katoh and H. Imai, “An extended construction method of visual secret sharing scheme,” IEICE Trans. Fundamentals (Japanese Edition), vol.J79-A, no.8, pp.1344-1351, Aug. 1996.