Skip to main content
Erschienen in: International Journal of Multimedia Information Retrieval 4/2019

15.11.2018 | Trends and Surveys

A survey paper on secret image sharing schemes

verfasst von: Oinam Bidyapati Chanu, Arambam Neelima

Erschienen in: International Journal of Multimedia Information Retrieval | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the speedy progress of network technology and internet applications, protection of digitized data against unauthorized access and modification has become a paramount issue. In order to face this challenge, numerous secret image sharing schemes have been introduced. Secret image sharing scheme is a method used for safeguarding the sensitive digitized image against illegal copying and tempering. The secret image is divided into many random shares in such a way that each share does not reveal any information to the intruders. In this paper, we present a comprehensive survey from over 100 papers which explains the new approaches and challenges. This paper also provides a comparative analysis of different methods based on different properties.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing. In: Proceedings of the 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1661–1666 Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing. In: Proceedings of the 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1661–1666
2.
Zurück zum Zitat Tsai M-H, Chen C-C (2013) A study on secret image sharing. In: Proceedings of the 6th international workshop on image media quality and its applications, Tokyo, Japan. Citeseer, pp 135–139 Tsai M-H, Chen C-C (2013) A study on secret image sharing. In: Proceedings of the 6th international workshop on image media quality and its applications, Tokyo, Japan. Citeseer, pp 135–139
4.
Zurück zum Zitat Blakley GR et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317 Blakley GR et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317
5.
Zurück zum Zitat Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770 Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
6.
Zurück zum Zitat Nair DG, Binu V, Kumar GS, An improved e-voting scheme using secret sharing based secure multi-party computation. arXiv preprint arXiv:1502.07469 Nair DG, Binu V, Kumar GS, An improved e-voting scheme using secret sharing based secure multi-party computation. arXiv preprint arXiv:​1502.​07469
7.
Zurück zum Zitat Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414 Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
8.
Zurück zum Zitat Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076 Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
9.
Zurück zum Zitat Wu C-C, Hwang M-S, Kao S-J (2009) A new approach to the secret image sharing with steganography and authentication. Imaging Sci J 57(3):140–151 Wu C-C, Hwang M-S, Kao S-J (2009) A new approach to the secret image sharing with steganography and authentication. Imaging Sci J 57(3):140–151
10.
Zurück zum Zitat Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41(10):3130–3137MATH Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41(10):3130–3137MATH
11.
Zurück zum Zitat Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognit 43(1):397–404MATH Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognit 43(1):397–404MATH
12.
Zurück zum Zitat Yang C-N, Ouyang J-F, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735 Yang C-N, Ouyang J-F, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735
13.
Zurück zum Zitat Singh A, Jauhari U (2012) A symmetric steganography with secret sharing and psnr analysis for image steganography. Int J Sci Eng Res 3(6):2–8 Singh A, Jauhari U (2012) A symmetric steganography with secret sharing and psnr analysis for image steganography. Int J Sci Eng Res 3(6):2–8
14.
Zurück zum Zitat Girdhar A, Kaur A (2013) Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International conference on innovations in engineering and technology, pp 58–61 Girdhar A, Kaur A (2013) Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International conference on innovations in engineering and technology, pp 58–61
15.
Zurück zum Zitat Bal RG, Ezhilarasu DP (2014) An efficient safe and secured video steganography using shadow derivation. Int J Innov Res Comput Commun Eng 2(3):3251–3258 Bal RG, Ezhilarasu DP (2014) An efficient safe and secured video steganography using shadow derivation. Int J Innov Res Comput Commun Eng 2(3):3251–3258
16.
Zurück zum Zitat Metri P, Desai S (2014) Performance analysis of secret sharing algorithm. J Eng Comput ApplSci 3(7):51–55 Metri P, Desai S (2014) Performance analysis of secret sharing algorithm. J Eng Comput ApplSci 3(7):51–55
17.
Zurück zum Zitat Sehgal N, Goel A (2014) Evolution in image steganography. Int J Inf Comput Technol 4:1221–1227 Sehgal N, Goel A (2014) Evolution in image steganography. Int J Inf Comput Technol 4:1221–1227
18.
Zurück zum Zitat Liu L, Wang A, Chang C-C, Li Z (2017) A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding. IJ Netw Secur 19(3):327–334 Liu L, Wang A, Chang C-C, Li Z (2017) A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding. IJ Netw Secur 19(3):327–334
19.
Zurück zum Zitat Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373 Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
20.
Zurück zum Zitat Lee C-W (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the png image with a data repair capability. IEEE Trans Image Process 21(1):207–218MathSciNetMATH Lee C-W (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the png image with a data repair capability. IEEE Trans Image Process 21(1):207–218MathSciNetMATH
21.
Zurück zum Zitat Tulasidasu M, Sirisha BL, Reddy KR (2015) Steganography based secret image sharing using block division technique. In: Proceedings of the 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1173–1176 Tulasidasu M, Sirisha BL, Reddy KR (2015) Steganography based secret image sharing using block division technique. In: Proceedings of the 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1173–1176
22.
Zurück zum Zitat Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. In: International workshop on security protocols. Springer, Berlin, pp 197–202 Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. In: International workshop on security protocols. Springer, Berlin, pp 197–202
23.
Zurück zum Zitat Kandar S, Maiti A, Dhara BC (2011) Visual cryptography scheme forcolor image using random number with enveloping by digitalwatermarking. Int J Comput Sci Issues (IJCSI) 8(3):543 Kandar S, Maiti A, Dhara BC (2011) Visual cryptography scheme forcolor image using random number with enveloping by digitalwatermarking. Int J Comput Sci Issues (IJCSI) 8(3):543
24.
Zurück zum Zitat Anandhi S (2012) Satthiyaraj, embedded visual cryptography schemes for secret images. IJCSNS Int J Comput Sci Netw Secur 12(12):153–158 Anandhi S (2012) Satthiyaraj, embedded visual cryptography schemes for secret images. IJCSNS Int J Comput Sci Netw Secur 12(12):153–158
25.
Zurück zum Zitat Sharma S (2013) An implementation of a novel secret image sharing algorithm. Int J Comput Sci Mob Comput 2(4):263–268 Sharma S (2013) An implementation of a novel secret image sharing algorithm. Int J Comput Sci Mob Comput 2(4):263–268
26.
Zurück zum Zitat Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for secret image sharing using gas algorithm. Int J Comput Appl 92(8):11–16 Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for secret image sharing using gas algorithm. Int J Comput Appl 92(8):11–16
27.
Zurück zum Zitat Thorat SMK, Dhanashri NR, Patil D (2016) Embedded visual cryptography for secret color images sharing using stamping algorithm, encryption and decryption technique. Int J Adv Res Comput Commun Eng 5(6):37–42 Thorat SMK, Dhanashri NR, Patil D (2016) Embedded visual cryptography for secret color images sharing using stamping algorithm, encryption and decryption technique. Int J Adv Res Comput Commun Eng 5(6):37–42
28.
Zurück zum Zitat Padiya IM, Dalvi G (2014) Encrypting multiple images using visual secret sharing scheme. Int J Sci Res (IJSR) 3(10):107–111 Padiya IM, Dalvi G (2014) Encrypting multiple images using visual secret sharing scheme. Int J Sci Res (IJSR) 3(10):107–111
29.
Zurück zum Zitat Shetty S, Abraham MP (2015) A secure visual cryptography scheme for sharing secret image using RSA. Int J Innov Res Comput Commun Eng 3(4):3331–3336 Shetty S, Abraham MP (2015) A secure visual cryptography scheme for sharing secret image using RSA. Int J Innov Res Comput Commun Eng 3(4):3331–3336
30.
Zurück zum Zitat Bhadran R (2015) An improved visual cryptography scheme for colour images. Int Res J Eng Technol 2(5):1391–1395 Bhadran R (2015) An improved visual cryptography scheme for colour images. Int Res J Eng Technol 2(5):1391–1395
31.
Zurück zum Zitat Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng, ISSN (Online), pp 2278–1021 Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng, ISSN (Online), pp 2278–1021
32.
Zurück zum Zitat Durgamba MNSS, Samson Ch (2015) Multiple image sharing scheme using visual cryptography. Int J Adv Res Comput Sci Softw Eng 5(8):134–137 Durgamba MNSS, Samson Ch (2015) Multiple image sharing scheme using visual cryptography. Int J Adv Res Comput Sci Softw Eng 5(8):134–137
33.
Zurück zum Zitat Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28(12):1600–1610 Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28(12):1600–1610
34.
Zurück zum Zitat Lin S-J, Lin J-C (2007) Vcpss: a two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognit 40(12):3652–3666MATH Lin S-J, Lin J-C (2007) Vcpss: a two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognit 40(12):3652–3666MATH
35.
Zurück zum Zitat Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. In: Proceedings of the 2011 international conference on information and electronics engineering IPCSIT, vol 6. IEEE, Washington, pp 171–175 Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. In: Proceedings of the 2011 international conference on information and electronics engineering IPCSIT, vol 6. IEEE, Washington, pp 171–175
36.
Zurück zum Zitat Surekha B, Swamy G (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci Issues (IJCSI) 9(3):312–317 Surekha B, Swamy G (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci Issues (IJCSI) 9(3):312–317
37.
Zurück zum Zitat Dharwadkar NV, Amberker B (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100 Dharwadkar NV, Amberker B (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100
38.
Zurück zum Zitat Rani A, Bhullar AK, Dangwal D, Kumar S (2015) A zero-watermarking scheme using discrete wavelet transform. Procedia Comput Sci 70:603–609 Rani A, Bhullar AK, Dangwal D, Kumar S (2015) A zero-watermarking scheme using discrete wavelet transform. Procedia Comput Sci 70:603–609
39.
Zurück zum Zitat Kong J, Zhang Y, Meng X, Zheng Y, Lu Y (2007) A scalable secret image sharing method based on discrete wavelet transform. In: International conference on life system modeling and simulation, Springer, Berlin, pp 736–745 Kong J, Zhang Y, Meng X, Zheng Y, Lu Y (2007) A scalable secret image sharing method based on discrete wavelet transform. In: International conference on life system modeling and simulation, Springer, Berlin, pp 736–745
40.
Zurück zum Zitat Hashim AT, George LE (2013) Secret image sharing based on wavelet transform. In: International conference on information technology in signal and image processing, Mumbai, India, pp 324–332 Hashim AT, George LE (2013) Secret image sharing based on wavelet transform. In: International conference on information technology in signal and image processing, Mumbai, India, pp 324–332
41.
Zurück zum Zitat Huang C-P, Li C-C (2006) A secret image sharing method using integer-to-integer wavelet transform. In: Null. IEEE, pp 802–805 Huang C-P, Li C-C (2006) A secret image sharing method using integer-to-integer wavelet transform. In: Null. IEEE, pp 802–805
42.
Zurück zum Zitat Fang W-P et al (2007) Quality controllable progressive secret image sharingdiscrete cosine transform approach. Int J Educ Inf Technol 1:43–47 Fang W-P et al (2007) Quality controllable progressive secret image sharingdiscrete cosine transform approach. Int J Educ Inf Technol 1:43–47
43.
Zurück zum Zitat Koikara R, Goswami M, Kim P-H, Lee G-J, Yoo K-Y (2015) Block-DCT based secret image sharing over gf (\(2\hat{\,\,}\) sup \(8\hat{\,\,}\)). In: Proceedings of the international conference onsecurity and management (SAM), The steering committee of the worldcongress in computer science, computer engineering and appliedcomputing (WorldComp), p 178 Koikara R, Goswami M, Kim P-H, Lee G-J, Yoo K-Y (2015) Block-DCT based secret image sharing over gf (\(2\hat{\,\,}\) sup \(8\hat{\,\,}\)). In: Proceedings of the international conference onsecurity and management (SAM), The steering committee of the worldcongress in computer science, computer engineering and appliedcomputing (WorldComp), p 178
44.
Zurück zum Zitat Koikara R, Deka DJ, Gogoi M, Das R (2015) A novel distributed image steganography method based on block-DCT. In: Advanced computer and communication engineering technology, Springer, Berlin, pp 423–435 Koikara R, Deka DJ, Gogoi M, Das R (2015) A novel distributed image steganography method based on block-DCT. In: Advanced computer and communication engineering technology, Springer, Berlin, pp 423–435
45.
Zurück zum Zitat Nag A, Biswas S, Sarkar D, Sarkar PP (2014) A new (k, n) verifiable secret image sharing scheme (vsiss). Egypt Inform J 15(3):201–209 Nag A, Biswas S, Sarkar D, Sarkar PP (2014) A new (k, n) verifiable secret image sharing scheme (vsiss). Egypt Inform J 15(3):201–209
46.
Zurück zum Zitat Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113MathSciNet Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113MathSciNet
47.
Zurück zum Zitat Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49 Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49
48.
Zurück zum Zitat Wu KS, Lo T-M (2013) An efficient secret image sharing scheme. Appl Math Mater 284:3025–3029 Wu KS, Lo T-M (2013) An efficient secret image sharing scheme. Appl Math Mater 284:3025–3029
49.
50.
Zurück zum Zitat Fang T-P (2011) Safe secret image sharing with fault tolerance key. IJCSNS Int J Comput Sci Netw Secur 11(9):20–23 Fang T-P (2011) Safe secret image sharing with fault tolerance key. IJCSNS Int J Comput Sci Netw Secur 11(9):20–23
51.
Zurück zum Zitat Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772MATH Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772MATH
52.
Zurück zum Zitat Fang W-P, Lin J-C (2006) Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int J Comput Netw Secur 6:228–234 Fang W-P, Lin J-C (2006) Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int J Comput Netw Secur 6:228–234
53.
Zurück zum Zitat Chang Y-J, Lin S-J, Lin J-C (2008) Authentication and cross-recovery for multiple images. J Electron Imaging 17(4):043007 Chang Y-J, Lin S-J, Lin J-C (2008) Authentication and cross-recovery for multiple images. J Electron Imaging 17(4):043007
54.
Zurück zum Zitat Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des Codes Cryptogr 40(1):81–102MathSciNetMATH Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des Codes Cryptogr 40(1):81–102MathSciNetMATH
55.
Zurück zum Zitat Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24(3):255–278MathSciNetMATH Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24(3):255–278MathSciNetMATH
56.
Zurück zum Zitat Wang K, Zou X., Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: Proceedings of the 33rd annual IEEE international computer software and applications conference, 2009. COMPSAC’09, vol 1. IEEE, pp 400–405 Wang K, Zou X., Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: Proceedings of the 33rd annual IEEE international computer software and applications conference, 2009. COMPSAC’09, vol 1. IEEE, pp 400–405
57.
Zurück zum Zitat Adachi T, Okazaki C (2014) A multi-secret sharing scheme with many keys based on hermite interpolation. J Appl Math Phys 2(13):1196 Adachi T, Okazaki C (2014) A multi-secret sharing scheme with many keys based on hermite interpolation. J Appl Math Phys 2(13):1196
58.
Zurück zum Zitat Feng B, Guo C, Li M, Wang Z-H (2015) A novel proactive multi-secret sharing scheme. IJ Netw Secur 17(2):123–128 Feng B, Guo C, Li M, Wang Z-H (2015) A novel proactive multi-secret sharing scheme. IJ Netw Secur 17(2):123–128
59.
Zurück zum Zitat Li H, Cheng C, Pang L (2005) A new (t, n)-threshold multi-secret sharing scheme. In: International conference on computational and information science, Springer, Berlin, pp 421–426 Li H, Cheng C, Pang L (2005) A new (t, n)-threshold multi-secret sharing scheme. In: International conference on computational and information science, Springer, Berlin, pp 421–426
60.
Zurück zum Zitat Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Pers Commun 95(2):1495–1504 Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Pers Commun 95(2):1495–1504
61.
Zurück zum Zitat Hodeish ME, Bukauskas L, Humbe VT (2016) An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput Sci 93:760–767 Hodeish ME, Bukauskas L, Humbe VT (2016) An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput Sci 93:760–767
62.
Zurück zum Zitat Tajan FSS, Dehkordi MH, Mirghadri A (2013) Reviewing multiple secret image sharing scheme based on matrix multiplication. Int J Comput Technol Appl 4(3):494 Tajan FSS, Dehkordi MH, Mirghadri A (2013) Reviewing multiple secret image sharing scheme based on matrix multiplication. Int J Comput Technol Appl 4(3):494
63.
Zurück zum Zitat Rajput Aarti PK (2012) Multiple secret sharing scheme with gray-level mixing using evcs. Int J Comput Appl 4(2):24–29MathSciNet Rajput Aarti PK (2012) Multiple secret sharing scheme with gray-level mixing using evcs. Int J Comput Appl 4(2):24–29MathSciNet
64.
Zurück zum Zitat Chen C-C, Tsai Y-H (2015) An expandable essential secret image sharing structure. J Inf Hiding Multimed Signal Process 7(1):135–144 Chen C-C, Tsai Y-H (2015) An expandable essential secret image sharing structure. J Inf Hiding Multimed Signal Process 7(1):135–144
65.
Zurück zum Zitat Chang C-C, Lin P-Y, Wang Z-H, Li M (2010) A sudoku-based secret image sharing scheme with reversibility. JCM 5(1):5–12 Chang C-C, Lin P-Y, Wang Z-H, Li M (2010) A sudoku-based secret image sharing scheme with reversibility. JCM 5(1):5–12
66.
Zurück zum Zitat Patel A (2016) Enhanced multi secret image sharing scheme for gray and RGB images. Int J Sci Res (IJSR) 5(2):1867–1871 Patel A (2016) Enhanced multi secret image sharing scheme for gray and RGB images. Int J Sci Res (IJSR) 5(2):1867–1871
67.
Zurück zum Zitat Zhao Z, Luo H, Lu Z-M (2010) Shadow size reduction and multiple image secret sharing based on discrete fractional random transform. Inf Technol J 9:298–304 Zhao Z, Luo H, Lu Z-M (2010) Shadow size reduction and multiple image secret sharing based on discrete fractional random transform. Inf Technol J 9:298–304
68.
Zurück zum Zitat Anbarasi J, Mala A (2015) Verifiable multi secret sharing scheme for 3D models. Int Arab J Inf Technol (IAJIT) 12:708–713 Anbarasi J, Mala A (2015) Verifiable multi secret sharing scheme for 3D models. Int Arab J Inf Technol (IAJIT) 12:708–713
69.
Zurück zum Zitat Mohamed FP et al (2015) (n, n) secret color image sharing scheme with dynamic group. Int J Comput Netw Inf Secur 7(7):46 Mohamed FP et al (2015) (n, n) secret color image sharing scheme with dynamic group. Int J Comput Netw Inf Secur 7(7):46
70.
Zurück zum Zitat Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869 Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869
71.
Zurück zum Zitat Shyu SJ, Chuang C-C, Chen Y-R, Lai A-F (2009) Weighted threshold secret image sharing. In: Pacific-Rim symposium on image and video technology. Springer, Berlin, pp 988–998 Shyu SJ, Chuang C-C, Chen Y-R, Lai A-F (2009) Weighted threshold secret image sharing. In: Pacific-Rim symposium on image and video technology. Springer, Berlin, pp 988–998
72.
Zurück zum Zitat Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the international conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp), p 318 Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the international conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp), p 318
73.
Zurück zum Zitat Lin S-J, Chen LS-T, Lin J-C (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008 Lin S-J, Chen LS-T, Lin J-C (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008
74.
Zurück zum Zitat Chen C-C, Fu W-Y, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577MathSciNet Chen C-C, Fu W-Y, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577MathSciNet
75.
Zurück zum Zitat Yang C-C, Chang T-Y, Hwang M-S (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490MathSciNetMATH Yang C-C, Chang T-Y, Hwang M-S (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490MathSciNetMATH
76.
Zurück zum Zitat Naskar PK, Khan HN, Chaudhuri A (2016) A key based secure threshold cryptography for secret image. IJ Netw Secur 18(1):68–81 Naskar PK, Khan HN, Chaudhuri A (2016) A key based secure threshold cryptography for secret image. IJ Netw Secur 18(1):68–81
77.
Zurück zum Zitat Kumar RKBN, Kumar GR (2016) Secret image sharing technique based on bitwise xor. Int J Comput Sci Eng Technol 6(5):138–143 Kumar RKBN, Kumar GR (2016) Secret image sharing technique based on bitwise xor. Int J Comput Sci Eng Technol 6(5):138–143
78.
Zurück zum Zitat Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785MATH Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785MATH
79.
Zurück zum Zitat Patil S, Sathe S, Mehetre P, Shinde D, Bhalerao K, Pandey P (2013) Secure and verifiable (2, 2) secret sharing scheme for binary images. Int J Comput Sci Issues (IJCSI) 10(1):290 Patil S, Sathe S, Mehetre P, Shinde D, Bhalerao K, Pandey P (2013) Secure and verifiable (2, 2) secret sharing scheme for binary images. Int J Comput Sci Issues (IJCSI) 10(1):290
80.
Zurück zum Zitat Bai L, Biswas S., Ortiz A, Dalessandro D (2006) An image secret sharing method. In: Proceedings of the 2006 9th international conference on information fusion. IEEE, pp 1–6 Bai L, Biswas S., Ortiz A, Dalessandro D (2006) An image secret sharing method. In: Proceedings of the 2006 9th international conference on information fusion. IEEE, pp 1–6
81.
Zurück zum Zitat Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31–36 Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31–36
82.
Zurück zum Zitat Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97MATH Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97MATH
83.
Zurück zum Zitat Chen C-C, Wu W-J (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114 Chen C-C, Wu W-J (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
84.
Zurück zum Zitat Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34 Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
85.
Zurück zum Zitat Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683 Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683
86.
Zurück zum Zitat Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594 Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594
87.
Zurück zum Zitat Nag A, Biswas S, Sarkar D, Sarkar PP (2013) Image secret sharing in stego-images with authentication. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Berlin, pp 764–770 Nag A, Biswas S, Sarkar D, Sarkar PP (2013) Image secret sharing in stego-images with authentication. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Berlin, pp 764–770
88.
Zurück zum Zitat Chen C-C, Liu C-AL (2013) Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22(1):013008 Chen C-C, Liu C-AL (2013) Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22(1):013008
89.
Zurück zum Zitat Lin Y-T, Juan JS-T, Wang Y-C (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. In: Proceedings of the 2010 8th IEEE international conference on industrial informatics (INDIN). IEEE, pp 437–442 Lin Y-T, Juan JS-T, Wang Y-C (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. In: Proceedings of the 2010 8th IEEE international conference on industrial informatics (INDIN). IEEE, pp 437–442
90.
Zurück zum Zitat Shyu S-J, Chen Y-R (2008) On secret multiple image sharing. In: Proceeding of the 25th workshop on combinatorial mathematics and computation theory. Citeseer, pp 24–25 Shyu S-J, Chen Y-R (2008) On secret multiple image sharing. In: Proceeding of the 25th workshop on combinatorial mathematics and computation theory. Citeseer, pp 24–25
91.
Zurück zum Zitat Lee C-F, Juan JS-T (2009) An efficient and secure multi-secret image sharing scheme with general access structure. In: Proceedings of the third IEEE international conference on secure software integration and reliability improvement. SSIRI 2009. IEEE, pp 253–259 Lee C-F, Juan JS-T (2009) An efficient and secure multi-secret image sharing scheme with general access structure. In: Proceedings of the third IEEE international conference on secure software integration and reliability improvement. SSIRI 2009. IEEE, pp 253–259
92.
Zurück zum Zitat Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433 Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433
93.
Zurück zum Zitat Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: Proceedings of the 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697 Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: Proceedings of the 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697
94.
Zurück zum Zitat Anbarasi LJ, Mala GA, Narendra M (2015) Dna based multi-secret image sharing. Procedia Comput Sci 46:1794–1801 Anbarasi LJ, Mala GA, Narendra M (2015) Dna based multi-secret image sharing. Procedia Comput Sci 46:1794–1801
95.
Zurück zum Zitat Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91 Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91
96.
Zurück zum Zitat Shyu SJ, Chen Y-R (2008) Threshold secret image sharing by Chinese remainder theorem. In: Asia-Pacific services computing conference. APSCC’08. IEEE, pp 1332–1337 Shyu SJ, Chen Y-R (2008) Threshold secret image sharing by Chinese remainder theorem. In: Asia-Pacific services computing conference. APSCC’08. IEEE, pp 1332–1337
97.
Zurück zum Zitat Mignotte M (19821) How to share a secret. In: Workshop on cryptography, Springer, Berlin, pp 371–375 Mignotte M (19821) How to share a secret. In: Workshop on cryptography, Springer, Berlin, pp 371–375
98.
Zurück zum Zitat Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170 Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170
99.
Zurück zum Zitat Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03):1250023MathSciNetMATH Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03):1250023MathSciNetMATH
100.
Zurück zum Zitat Shyu S-J, Chuang C-C, Chen Y-R, Lai A-F (2009) Sharing an image with variable-sized shadows. J Internet Technol 10(2):155–161 Shyu S-J, Chuang C-C, Chen Y-R, Lai A-F (2009) Sharing an image with variable-sized shadows. J Internet Technol 10(2):155–161
101.
Zurück zum Zitat Chang C-C, Lin C-C, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recognit 42(11):3097–3114MATH Chang C-C, Lin C-C, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recognit 42(11):3097–3114MATH
102.
Zurück zum Zitat Chen C-C, Chen J-L (2017) A new boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54 Chen C-C, Chen J-L (2017) A new boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54
103.
Zurück zum Zitat Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55 Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55
104.
Zurück zum Zitat Singh P, Raman B, Misra M (2017) A secure image sharing scheme based on SVD and fractional fourier transform. Signal Process Image Commun 57:46–59 Singh P, Raman B, Misra M (2017) A secure image sharing scheme based on SVD and fractional fourier transform. Signal Process Image Commun 57:46–59
105.
Zurück zum Zitat Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291–302 Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291–302
106.
Zurück zum Zitat Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32 Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32
107.
Zurück zum Zitat Yang C-N, Hsieh C-L, Cai S-R (2014) Secret image sharing schemes by using maximum distance separable codes. Int J Mach Learn Comput 4(6):522 Yang C-N, Hsieh C-L, Cai S-R (2014) Secret image sharing schemes by using maximum distance separable codes. Int J Mach Learn Comput 4(6):522
108.
Zurück zum Zitat Chang C-C, Huynh N-T, Chung T-F (2014) Efficient searching strategy for secret image sharing with meaningful shadows. Int J Mach Learn Comput 4(5):423 Chang C-C, Huynh N-T, Chung T-F (2014) Efficient searching strategy for secret image sharing with meaningful shadows. Int J Mach Learn Comput 4(5):423
109.
Zurück zum Zitat Chien-Chang Chen Y-CL (2009) Weighted modulated secret image sharing method. J Electron Imaging 18(4):043011 Chien-Chang Chen Y-CL (2009) Weighted modulated secret image sharing method. J Electron Imaging 18(4):043011
110.
Zurück zum Zitat Chi-Shiang Chan Y-CC, Yi-Hui Chen Y-Y T (2014) Role-balance based multi-secret images sharing using Boolean operations. KSII Trans Internet Inf Syst 8(5):1785–1800 Chi-Shiang Chan Y-CC, Yi-Hui Chen Y-Y T (2014) Role-balance based multi-secret images sharing using Boolean operations. KSII Trans Internet Inf Syst 8(5):1785–1800
111.
Zurück zum Zitat Wang Z-H, Pizzolatti MS, Chang C-C (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69 Wang Z-H, Pizzolatti MS, Chang C-C (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69
Metadaten
Titel
A survey paper on secret image sharing schemes
verfasst von
Oinam Bidyapati Chanu
Arambam Neelima
Publikationsdatum
15.11.2018
Verlag
Springer London
Erschienen in
International Journal of Multimedia Information Retrieval / Ausgabe 4/2019
Print ISSN: 2192-6611
Elektronische ISSN: 2192-662X
DOI
https://doi.org/10.1007/s13735-018-0161-3

Weitere Artikel der Ausgabe 4/2019

International Journal of Multimedia Information Retrieval 4/2019 Zur Ausgabe