[1] A. Shamir, “How to Share a Secret,” Journal of Communication, ACM, vol. 24, no. 11, pp. 612-613, 1979.
[2] G. R. Blakley, “Safeguarding Cryptographic Keys[C],” Proc. of AFIPS 1979 National Computer Conference, pp. 313-317, 1979.
[3] E. D. Karnin, J. W. Greene, and M. E. Hellman, “On Sharing Secret Systems[J],” IEEE Transactions on Information Theory, vol. 29, no. 1, pp. 35-41, 1983.
[4] M. Naor and A. Shamir, “Visual Cryptography[C],” Advances in Cryptology-Eurocrypt, vol. 94, pp. 1-12, 1994.
[5] M. Naor and A. Shamir, “Visual Cryptography II: Improving the Contras Via the Cover Base[C],” Lecture Notes in Computer Science, Springer Berlin vol. 1189, pp. 197-202, 1997.
[6] H. Zheng Feng and G. Hanjun, “A Compressible Threshold Image Sharing Scheme Based on Matrix Multiplication[J],” Geomatics and Information Science of Wuhan University, vol. 33, no. 10, pp. 1003-1006, 2008.
[7] Ch. Chin-Chen, L. Chia-Chen, L. Chia-Hsuan, and Ch. Yi-Hui, “A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images [J],” Information Sciences, vol. 178, pp. 2433–2447, 2008.
[8] H. Zheng Feng and G. Hanjun, “Multi Secret Image Sharing Based on Matrix Multiplication,” IEEE International Conference on Networks Security, vol.1, pp. 184-187, 2009.
[9] D. J. Bernstein, “Salsa 20 Specification,” Department of Mathematics, Statistics, and Computer Science (M/C 249), The University of Illinois at Chicago, 2007.
9 مجله علمی - پژوهشی ” پدافند الکترونیکی و سایبری “ ، سال سوم، شماره 4، زمستان 4934
[10] A. Martin, D. Rey, and D. Avila, “A Matrix-Based Secret Sharing Scheme for Images,” Lecture Notes in Computer Science, vol. 5197, PP. 235-242, 2008.
[11] T.-H. Chen, C-S Wu, and W. Chang, “Efficient Multi-Secret Image Sharing Based on Boolean Operations,” Department of Computer Science and Information Engineering, National Chiayi University, 300 University Rd., Chia-Yi City, Taiwan 600, 2011.
[12] Z. H. Wang, Ch. Ch. Chang, H. Ngoc Tu, and M. Ch. Li, “Sharing a Secret Image in Binary Images with Verification,” Journal of Information Hiding andMultimedia Signal Processing, vol. 2, no. 1, 2011.
[13] J. Daniel, “Bernstein The Salsa20 Family of Stream Ciphers,” Department of Mathematics, Statistics, and Computer Science (M/C 249), The University of Illinois at Chicago, IL 60607–7045.
[14] D. Wang, L. Zhang, N. Ma, and X. Li, “Two Secret Sharing Schemes Based on Boolean Operations,” vol. 40, no. 10, pp. 2776–2785, 2007.
[15] F. Sheikh Sangtajan and M. Hadyan Dehkordi, “Analysis of several Visual Secret Sharing Schemes and Improvement One of Them,” Ph.D. Thesis, Imam Hussein University, Sep. 2013.