[1] Shamir Adi. How to share a secret. Commun. ACM, 22:612–613, 1979.
[2] Ali Kanso and Mohammad Ghebleh. An efficient(t, n)–threshold secret image sharing scheme. Multimedia Tools and Applications, 76:16369–16388, 2017.
[3] Chih-Ching Thien and Ja-Chen Lin. Secret image sharing. Computers & Graphics, 26(5):765–770, 2002.
[4] Chang-Chou Lin and Wen-Hsiang Tsai. Secret image sharing with steganography and authentication. Journal of Systems and software, 73(3):405–414, 2004.
[5] Ching-Nung Yang, Chih-Cheng Wu, Yi-Chin Lin, and Cheonshik Kim. Enhanced matrix-based secret image sharing scheme. IEEE Signal Processing Letters, 19(12):789–792, 2012.
[6] Chin-Chen Chang, Yi-Pei Hsieh, and Chia-Hsuan Lin. Sharing secrets in stego images with authentication. Pattern Recognition, 41(10):3130–3137, 2008.
[7] Chin-Chen Chang, Yi-Hui Chen, and Lin-Yi Chuang. Meaningful shadows for image secret sharing with steganography and authentication techniques. J. Inf. Hiding Multim. Signal Process., 5(3):342–352, 2014.
[8] Lizhi Xiong, Xinwei Zhong, Ching-Nung Yang, and Xiao Han. Transform domain-based invertible and lossless secret image sharing with authentication. IEEE Transactions on information Forensics and Security, 16:2912–2925, 2021.
[9] Lizhi Xiong, Xinwei Zhong, and Ching-Nung Yang. Dwt-sisa: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Processing, 173:107571, 2020.
[10] Sara Charoghchi and Samaneh Mashhadi. A secure secret image sharing with steganography and authentication by hamming code (15, 11) for compressed images. Multimedia Tools and Applications, 83(11):31933–31955, 2024.
[11] Zahra Saeidi, Ameneh Yazdi, Samaneh Mashhadi, Masoud Hadian, and Adnan Gutub. High performance image steganography integrating iwt and hamming code within secret sharing. IET Image Processing, 18(1):129–139, 2024.
[12] Samaneh Mashhadi and Zahra Saeedi. A (t, n)-secret image sharing with steganography based on rook polynomial and lwe problem. Multimedia Tools and Applications, 82(25):39077–39097, 2023.
[13] Massoud Hadian Dehkordi and Samaneh Mashhadi. New efficient and practical verifiable multisecret sharing schemes. Information Sciences, 178(9):2262–2274, 2008.
[14] Xiaotian Wu and Ching-Nung Yang. Partial reversible ambtc-based secret image sharing with steganography. Digital Signal Processing, 93:22–33, 2019.
[15] Yan-Xiao Liu, Ching-Nung Yang, Yung-Shun Chou, Song-Yu Wu, and Qin-Dong Sun. Progressive (k, n) secret image sharing scheme with meaningful shadow images by gemd and rgemd. Journal of Visual Communication and Image Representation, 55:766–777, 2018.