[1] Adi Shamir, "How to share a secret", Communications of the ACM, Volume 22 Issue 11,Nov.1979, Pages 612-613, doi :10.1145/359168.359176.
[2] A Cheddad, J Condell, K Curran and P McKevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing, Volume 90, Issue 3, March 2010, Pages 727-752.
[3] H C Hsu, J Chen, T S Chen, Y H Lin, “Special type of circular visual cryptography for multiple secret hiding”, The Imaging Science Journal 55(3), 2007, Pages 175-179.
[4] Jeanne Chen, Tung-Shou Chen, Hwa-Ching Hsu, Hsiao- Wen Chen, “New visual cryptography system based on circular shadow image and fixed angle segmentation”, Journal of Electronic Imaging 14(3), July 2005.
[5] Jen Beng Feng, Hesien Chu Wu, Chwei Shyong Tsai, “Visual Secret Sharing for multiple secrets”, Pattern Recognition 41,Volume 41 Issue 12, December 2008, Pages 3572-3581.
[6] Jithesh K, A V Senthil Kumar, “Multilayer Information Hiding- A Blend of Steganography and Visual Cryptography”, Journal of Theoretical and Applied Information Technology, Vol 19 No 2, 2010, Pages 109-116.
[7] O Kafri and E Keren, “Encryption of pictures and shapes by Random Grids”, Optics Letters Vol. 12, Issue 6, 1987, Pages 377-379.
[8] M Gnanaguruparan, S Kak, “Recursive Hiding Of Secrets In Visual Cryptography”, Cryptologia, vol. 26, 2002, Pages 68-76.
[9] R Wang, Y Chen, “High Payload Image Steganography Using Two-Way Block Matching”, IEEE Signal Processing Letters, 13(3), 2006, Pages 161-164.
[10] Saman Salehi, M A Balafar,”Visual Multi Secret Sharing by Cylindrical Random Grid”, Journal of Information Security and Applications, Volume 19 Issue 3, July 2014, Pages 245-255.
[11] Suvarna Patel, Gajendra Singh Chandel, “Performance Analysis of Steganography Based on 5 Wavelet Families by 4 Levels–DWT”, International Journal of Computer Science and Network Security, Vol 14 No 12, December 2014.
[12] Tanmay Bhattacharya, Nilanjan Dey, S R Bhadra Chaudhuri, “A Session based Multiple Image Hiding Technique using DWT and DCT”, International Journal of Computer Applications Volume 38. No 5, January 2012, Pages 18 – 21.
[13] Tzung-Her Chen, Kai-Hsiang Tsao,”Visual Secret sharing by Random Grids Revisited”, Pattern Recognition Volume 42 Issue 9, September 2009, Pages 2203-2217.
[14] Tsung-Lieh Lin, Shi-Jinn Horng, Kai-Hui Lee, Pei-Ling Chiu, Tzong-Wann Kao, Yuan-Hsin Chen, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, “A novel visual secret sharing scheme for multiple secrets without pixel expansion”, Expert Systems with Applications, Volume 37, Issue 12, December 2010, Pages 7858-7869.
[15] Tzung-Her Chen, Kuang-Che Li, “Multi-image encryption by circular random grids”, Information Sciences, Informatics and Computer Science, Intelligent Systems, Applications: An International Journal, Volume 189, April, 2012, Pages 255-265.
[16] Tzung-Her Chen, Yao-Sheng Lee, Wei-Lun Huang, Justice Su-Tzu Juan, Ying-Yu Chen, Ming-Jheng Li, “Quality-adaptive visual secret sharing by random grids”, Original Research Article Journal of Systems and Software, Volume 86, Issue 5, May 2013,Pages 1267-1274.
[17] V I Arnold, A Avez, “Ergodic Problems in Classical Mechanics”, The Mathematical Physics Monograph Series, W A Benjamin, Inc, Preis geb, NewYork, 1968.
[18] William Stallings, “Cryptography and Network Security“, Seventh Edition, Pearson Education, 2017, ISBN-10: 9789332585225.
[19] Wu, L. and Chen H. A Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998.
[20] “Pairing Function”, Source: http://mathworld.wolfram.com, Last Access: July 2013.
[21] Joy Jo-Yi Chang and Justie Su-Tzu Juan, “Two secret sharing scheme by Shifting Random Grids”, Proceeding of the 29th Workshop on Combinatorial Mathematics and Computation Theory, National Taipei College of Business, Institute of Information and Decision Sciences, Taipei, Taiwan, April 27-28, 2012.
[22] Naor M., Shamir A. (1995) Visual cryptography. In: De Santis A. (eds) Advances in Cryptology EUROCRYPT 1994. Lecture Notes in Computer Science, Vol 950. Springer, Berlin, Heidelberg.
[23] Sangita Roy, Manini Manasmita, ”A novel approach to format based text steganography”, Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011.
[24] Shabnam Samima, Ratnakirti Roy, Suvamoy Changder, “Secure Key Based Image Realization Steganography”, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), December 2013, Publisher : IEEE Xplore.
[25] Shouchao Song, Jie Zhang, Xin Liao, Jiao Du, Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Advanced In Control Engineering and Information Science, Procedia Engineering 15 (2011) , Page no : 2767-2772.