, Number of social network users worldwide from, pp.2019-2020, 2010.

J. M. Such and N. Criado, Multiparty privacy in social media, Communications of the ACM, vol.61, issue.8, pp.74-81, 2018.
DOI : 10.1145/3208039

URL : http://dl.acm.org/ft_gateway.cfm?id=3208039&type=pdf

G. R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference, vol.48, pp.313-317, 1979.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

C. Thien and J. Lin, Secret image sharing, Computers & Graphics, vol.26, issue.5, pp.765-770, 2002.

G. J. Simmons, How to (really) share a secret, Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, vol.88, pp.390-448, 1990.
DOI : 10.1007/0-387-34799-2_30

URL : https://link.springer.com/content/pdf/10.1007%2F0-387-34799-2_30.pdf

M. Belenkiy, Disjunctive multi-level secret sharing, IACR Cryptology ePrint Archive, p.18, 2008.

T. Tassa, Hierarchical threshold secret sharing, Journal of Cryptology, vol.20, issue.2, pp.237-264, 2007.
DOI : 10.1007/978-3-540-24638-1_26

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-24638-1_26.pdf

C. Guo, C. Chang, and C. Qin, A hierarchical threshold secret image sharing, Pattern Recognition Letters, vol.33, issue.1, pp.83-91, 2012.

N. Pakniat, M. Noroozi, and Z. Eslami, Secret image sharing scheme with hierarchical threshold access structure, Journal of Visual Communication and Image Representation, vol.25, issue.5, pp.1093-1101, 2014.
DOI : 10.1016/j.jvcir.2014.03.004

C. Yang, P. Li, C. Wu, and S. Cai, Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Processing: Image Communication, vol.31, pp.1-9, 2015.
DOI : 10.1016/j.image.2014.11.003