Some methods of key distribution using Chinese remainder theorem and wavelet transforms based on visual and public key cryptosystems