##[1] Poonam Bidgar, Neha Shahare “Key based Visual Cryptography Scheme using Novel Secret Sharing Technique with Steganography” IOSR Journal of Electronics and Communication Engineering, Volume 8, Issue 2, Dec. 2013.##[2] Dr M. Umamaheswari, Prof. S. Sivasubramanian, S. Pandiarajan “Analysis of Different Steganographic Algorithms for Secured DataHiding”, IJCSNS International Journal of Computer Science andNetwork Security, VOL.10 No.8, Aug 2010.##[3] Siddaram Shetty, Minu P. Abraham “A Proposal to Secure Visual Cryptographic Shares of Secret Image using RSA” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 12,Dec 2014.##[4] Biswapati lana, Partha Chowdhuri, Madhumita Mallick, Shyamal Kumar Mondal “Cheating Prevention in Visual Cryptography using Steganographic Scheme” IEEE Conference 2014.##[5] Mehdi Hussain and Mureed Hussain” A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, May 2013.##[6] Mr. Deepak S. Bhiogade, Prof. Shaikh Phiroj Chhaware” Steganography and Visual Cryptography for Secured Data Hiding” International Conference on Industrial Automation and Computing (ICIAC),13th Apr 2014.##[7] Shaveta Mahajan, Arpinder Singh” A Review of Methods and Approach for Secure Stegnography” International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE),Volume 2, Issue 10, Oct 2012.##[8] Khalil Challita and Hikmat Farhat “Combining Steganography and Cryptography: New Directions” International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011.##[9] Ravindra Gupta, Akanksha Jain, Gajendra Singh ” Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012.##[10] Rita Rana, Dheerendra Singh, Steganography-Concealing Messages in Images Using LSB Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image, International Journal ofComputer Science & CommunicationVol. 1, No. 2, pp. 113-116,JuL-Dec 2010.##[11] Rehana Begum R.D and Sharayu Pradeep “Best Approach for LSB Based Steganography Using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission over Networks” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 6, Jun 2014.##[12] Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, and Chwei-Shyong Tsai. A novel authenticable color visual secret sharing scheme using non-expanded meaningful shares. Displays, 32:118{134, Feb 2011.##[13] Moni Naor, Adi Shamir. Visual cryptography II: Improving the contrast via the cover base Security Protocols Security Protocols pp 197-202, 1996.##[14] Moni Naor, Adi Shamir. Visual cryptography, Security Protocols: Advances in Cryptology, EUROCRYPT'94, pp 1-12, 1994.##[15] Mitsuru Nakai,A Measure on the Harmonic Boundary of a Riemann Surface. Nagoya Mathematical Journal, Volume 17, pp. 181-218, August 1960.##[16] Kumar C, Singh AK, Kumar Pu”Improved wavelet-based image watermarking through SPIHT”, Multimedia Tools and Applications, vol. 79, no.15, pp.11069-11082.##[17] Zheng Z, Saxena N, Mishra KK, Sangaiah AK, ,” Guided Dynamic Particle Swarm Optimization for Optimizing Digital Image Watermarking in Industry Applications”, vol.88, pp.92–106, 2018.##[18] M. Islam, A. Roy, R.H. Laskar, “Neural network based robust image watermarking technique in LWT domain”, Journal of Intelligent & Fuzzy Systems, vol.u34, pp.u1691– 1700, 2018.##[20] I. Shafi, M. Noman, M. Gohar, A. Ahmad, M. Khan, S. Din, S.H. Ahmad, J. Ahmad, “An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment”, Soft Computing, vol.u22, no.5, pp.1555–1567, 2018.##[21] P.D. Shah, R.S. Bichkar, A Sec re Spatial Domain Image Steganography u using Genetic Algorithm and Linear Congr ential Generator, In International conference on intelligent computing and applications, pp.119-129, 2018.##[22] Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E., & Mohamed, E. ”A usec ureu image steganography algorithm based on least significant bit and integer wavelet transform”, Journal of Systems Engineering and Electronics, vol.29, no.3,uupp.639– 649, 2018.##