[1] Naor, M.; Shamir, A. “Visual Cryptography”; Workshop on the Theory and Application of Cryptographic Techniques, Springer, 1994.
[2] Thomas, S. A.; Gharge, S. “Review on Various Visual Cryptography Schemes”; Int. Conf. Current Trends in Computer, Electrical, Electronics and Communication, Mysore, 2017, 1164-1167.
[3] Jia, X.; Wang, D.; Nie, D.; Zhang, C. “Collaborative Visual Cryptography Schemes”; IEEE Trans. Circuits and Systems for Video Technology 2018, 28, 1056-1070.
[4] Chiu, P. L.; Lee, K. H. “A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes”; IEEE Trans. Information Forensics and Security 2011, 6, 992 - 1001.
[5] Lee, K. H.; Chiu, P. L. “Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints”; IEEE Trans. Image Proc. 2013, 22, 3830-41.
[6] Buckley, N.; Nagar, A.; Arumugam, S. “Evolution of Visual Cryptography Basis Matrices with Binary Chromosomes”; IEEE 8th EUROSIM Congress on Modelling and Simulation 2013.
[7] Arumugam, S.; Lakshmanan, R.; Nagar, A. K. “On (k, n)*-Visual Cryptography Scheme Designs”; Codes and Cryptography 2014, 71, 153-162.
[8] Revenkar, P. S.; Anjum, A.; Gandhare, W. “Survey of Visual Cryptography Schemes”; Int. J. Security and Its Applications 2010, 4, 49-56.
[9] Ramya, J.; Parvathavarthini, B. “An Extensive Review on Visual Cryptography Schemes”; IEEE Int. Conf. Control, Instrumentation, Communication and Computational Technologies, 2014.
[10] Hou, Y. C. “Visual Cryptography for Color Images”; Pattern Recognition 2003, 36, 1619-1629.
[11] Ateniese, G.; Blundo, C.; De Santis, A.; Stinsonc, D. R. “Constructions and Bounds for Visual Cryptography”; Int. Colloquium on Automata, Languages, and Programming. 1996, 416-428.
[12] Hofmeister, T.; Krause, M.; Simon, S. M. “Contrast-Optimal k Out of n Secret Sharing Schemes in Visual Cryptography”; Theoretical Computer Sci. 2000, 240, 471-485.
[13] Ateniese, G.; Blundo, C.; De Santis, A.; Stinsonc, D. R. “Extended Capabilities for Visual Cryptography”; Theoretical Computer Sci. 2001, 250, 143-161.
[14] Mirghaderi, A.; Jolfaei, A. “A Novel Chaotic Image Encryption Scheme Using Chaotic Maps”; Adv. Defence Sci. Technol. 2011, 2, 111-124.