Skip to main content
Top
Published in: International Journal of Multimedia Information Retrieval 4/2019

15-11-2018 | Trends and Surveys

A survey paper on secret image sharing schemes

Authors: Oinam Bidyapati Chanu, Arambam Neelima

Published in: International Journal of Multimedia Information Retrieval | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the speedy progress of network technology and internet applications, protection of digitized data against unauthorized access and modification has become a paramount issue. In order to face this challenge, numerous secret image sharing schemes have been introduced. Secret image sharing scheme is a method used for safeguarding the sensitive digitized image against illegal copying and tempering. The secret image is divided into many random shares in such a way that each share does not reveal any information to the intruders. In this paper, we present a comprehensive survey from over 100 papers which explains the new approaches and challenges. This paper also provides a comparative analysis of different methods based on different properties.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing. In: Proceedings of the 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1661–1666 Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing. In: Proceedings of the 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1661–1666
2.
go back to reference Tsai M-H, Chen C-C (2013) A study on secret image sharing. In: Proceedings of the 6th international workshop on image media quality and its applications, Tokyo, Japan. Citeseer, pp 135–139 Tsai M-H, Chen C-C (2013) A study on secret image sharing. In: Proceedings of the 6th international workshop on image media quality and its applications, Tokyo, Japan. Citeseer, pp 135–139
4.
go back to reference Blakley GR et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317 Blakley GR et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317
5.
go back to reference Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770 Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
6.
go back to reference Nair DG, Binu V, Kumar GS, An improved e-voting scheme using secret sharing based secure multi-party computation. arXiv preprint arXiv:1502.07469 Nair DG, Binu V, Kumar GS, An improved e-voting scheme using secret sharing based secure multi-party computation. arXiv preprint arXiv:​1502.​07469
7.
go back to reference Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414 Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
8.
go back to reference Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076 Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
9.
go back to reference Wu C-C, Hwang M-S, Kao S-J (2009) A new approach to the secret image sharing with steganography and authentication. Imaging Sci J 57(3):140–151 Wu C-C, Hwang M-S, Kao S-J (2009) A new approach to the secret image sharing with steganography and authentication. Imaging Sci J 57(3):140–151
10.
go back to reference Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41(10):3130–3137MATH Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41(10):3130–3137MATH
11.
go back to reference Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognit 43(1):397–404MATH Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognit 43(1):397–404MATH
12.
go back to reference Yang C-N, Ouyang J-F, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735 Yang C-N, Ouyang J-F, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735
13.
go back to reference Singh A, Jauhari U (2012) A symmetric steganography with secret sharing and psnr analysis for image steganography. Int J Sci Eng Res 3(6):2–8 Singh A, Jauhari U (2012) A symmetric steganography with secret sharing and psnr analysis for image steganography. Int J Sci Eng Res 3(6):2–8
14.
go back to reference Girdhar A, Kaur A (2013) Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International conference on innovations in engineering and technology, pp 58–61 Girdhar A, Kaur A (2013) Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International conference on innovations in engineering and technology, pp 58–61
15.
go back to reference Bal RG, Ezhilarasu DP (2014) An efficient safe and secured video steganography using shadow derivation. Int J Innov Res Comput Commun Eng 2(3):3251–3258 Bal RG, Ezhilarasu DP (2014) An efficient safe and secured video steganography using shadow derivation. Int J Innov Res Comput Commun Eng 2(3):3251–3258
16.
go back to reference Metri P, Desai S (2014) Performance analysis of secret sharing algorithm. J Eng Comput ApplSci 3(7):51–55 Metri P, Desai S (2014) Performance analysis of secret sharing algorithm. J Eng Comput ApplSci 3(7):51–55
17.
go back to reference Sehgal N, Goel A (2014) Evolution in image steganography. Int J Inf Comput Technol 4:1221–1227 Sehgal N, Goel A (2014) Evolution in image steganography. Int J Inf Comput Technol 4:1221–1227
18.
go back to reference Liu L, Wang A, Chang C-C, Li Z (2017) A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding. IJ Netw Secur 19(3):327–334 Liu L, Wang A, Chang C-C, Li Z (2017) A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding. IJ Netw Secur 19(3):327–334
19.
go back to reference Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373 Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
20.
go back to reference Lee C-W (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the png image with a data repair capability. IEEE Trans Image Process 21(1):207–218MathSciNetMATH Lee C-W (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the png image with a data repair capability. IEEE Trans Image Process 21(1):207–218MathSciNetMATH
21.
go back to reference Tulasidasu M, Sirisha BL, Reddy KR (2015) Steganography based secret image sharing using block division technique. In: Proceedings of the 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1173–1176 Tulasidasu M, Sirisha BL, Reddy KR (2015) Steganography based secret image sharing using block division technique. In: Proceedings of the 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1173–1176
22.
go back to reference Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. In: International workshop on security protocols. Springer, Berlin, pp 197–202 Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. In: International workshop on security protocols. Springer, Berlin, pp 197–202
23.
go back to reference Kandar S, Maiti A, Dhara BC (2011) Visual cryptography scheme forcolor image using random number with enveloping by digitalwatermarking. Int J Comput Sci Issues (IJCSI) 8(3):543 Kandar S, Maiti A, Dhara BC (2011) Visual cryptography scheme forcolor image using random number with enveloping by digitalwatermarking. Int J Comput Sci Issues (IJCSI) 8(3):543
24.
go back to reference Anandhi S (2012) Satthiyaraj, embedded visual cryptography schemes for secret images. IJCSNS Int J Comput Sci Netw Secur 12(12):153–158 Anandhi S (2012) Satthiyaraj, embedded visual cryptography schemes for secret images. IJCSNS Int J Comput Sci Netw Secur 12(12):153–158
25.
go back to reference Sharma S (2013) An implementation of a novel secret image sharing algorithm. Int J Comput Sci Mob Comput 2(4):263–268 Sharma S (2013) An implementation of a novel secret image sharing algorithm. Int J Comput Sci Mob Comput 2(4):263–268
26.
go back to reference Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for secret image sharing using gas algorithm. Int J Comput Appl 92(8):11–16 Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for secret image sharing using gas algorithm. Int J Comput Appl 92(8):11–16
27.
go back to reference Thorat SMK, Dhanashri NR, Patil D (2016) Embedded visual cryptography for secret color images sharing using stamping algorithm, encryption and decryption technique. Int J Adv Res Comput Commun Eng 5(6):37–42 Thorat SMK, Dhanashri NR, Patil D (2016) Embedded visual cryptography for secret color images sharing using stamping algorithm, encryption and decryption technique. Int J Adv Res Comput Commun Eng 5(6):37–42
28.
go back to reference Padiya IM, Dalvi G (2014) Encrypting multiple images using visual secret sharing scheme. Int J Sci Res (IJSR) 3(10):107–111 Padiya IM, Dalvi G (2014) Encrypting multiple images using visual secret sharing scheme. Int J Sci Res (IJSR) 3(10):107–111
29.
go back to reference Shetty S, Abraham MP (2015) A secure visual cryptography scheme for sharing secret image using RSA. Int J Innov Res Comput Commun Eng 3(4):3331–3336 Shetty S, Abraham MP (2015) A secure visual cryptography scheme for sharing secret image using RSA. Int J Innov Res Comput Commun Eng 3(4):3331–3336
30.
go back to reference Bhadran R (2015) An improved visual cryptography scheme for colour images. Int Res J Eng Technol 2(5):1391–1395 Bhadran R (2015) An improved visual cryptography scheme for colour images. Int Res J Eng Technol 2(5):1391–1395
31.
go back to reference Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng, ISSN (Online), pp 2278–1021 Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng, ISSN (Online), pp 2278–1021
32.
go back to reference Durgamba MNSS, Samson Ch (2015) Multiple image sharing scheme using visual cryptography. Int J Adv Res Comput Sci Softw Eng 5(8):134–137 Durgamba MNSS, Samson Ch (2015) Multiple image sharing scheme using visual cryptography. Int J Adv Res Comput Sci Softw Eng 5(8):134–137
33.
go back to reference Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28(12):1600–1610 Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28(12):1600–1610
34.
go back to reference Lin S-J, Lin J-C (2007) Vcpss: a two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognit 40(12):3652–3666MATH Lin S-J, Lin J-C (2007) Vcpss: a two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognit 40(12):3652–3666MATH
35.
go back to reference Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. In: Proceedings of the 2011 international conference on information and electronics engineering IPCSIT, vol 6. IEEE, Washington, pp 171–175 Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. In: Proceedings of the 2011 international conference on information and electronics engineering IPCSIT, vol 6. IEEE, Washington, pp 171–175
36.
go back to reference Surekha B, Swamy G (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci Issues (IJCSI) 9(3):312–317 Surekha B, Swamy G (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci Issues (IJCSI) 9(3):312–317
37.
go back to reference Dharwadkar NV, Amberker B (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100 Dharwadkar NV, Amberker B (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100
38.
go back to reference Rani A, Bhullar AK, Dangwal D, Kumar S (2015) A zero-watermarking scheme using discrete wavelet transform. Procedia Comput Sci 70:603–609 Rani A, Bhullar AK, Dangwal D, Kumar S (2015) A zero-watermarking scheme using discrete wavelet transform. Procedia Comput Sci 70:603–609
39.
go back to reference Kong J, Zhang Y, Meng X, Zheng Y, Lu Y (2007) A scalable secret image sharing method based on discrete wavelet transform. In: International conference on life system modeling and simulation, Springer, Berlin, pp 736–745 Kong J, Zhang Y, Meng X, Zheng Y, Lu Y (2007) A scalable secret image sharing method based on discrete wavelet transform. In: International conference on life system modeling and simulation, Springer, Berlin, pp 736–745
40.
go back to reference Hashim AT, George LE (2013) Secret image sharing based on wavelet transform. In: International conference on information technology in signal and image processing, Mumbai, India, pp 324–332 Hashim AT, George LE (2013) Secret image sharing based on wavelet transform. In: International conference on information technology in signal and image processing, Mumbai, India, pp 324–332
41.
go back to reference Huang C-P, Li C-C (2006) A secret image sharing method using integer-to-integer wavelet transform. In: Null. IEEE, pp 802–805 Huang C-P, Li C-C (2006) A secret image sharing method using integer-to-integer wavelet transform. In: Null. IEEE, pp 802–805
42.
go back to reference Fang W-P et al (2007) Quality controllable progressive secret image sharingdiscrete cosine transform approach. Int J Educ Inf Technol 1:43–47 Fang W-P et al (2007) Quality controllable progressive secret image sharingdiscrete cosine transform approach. Int J Educ Inf Technol 1:43–47
43.
go back to reference Koikara R, Goswami M, Kim P-H, Lee G-J, Yoo K-Y (2015) Block-DCT based secret image sharing over gf (\(2\hat{\,\,}\) sup \(8\hat{\,\,}\)). In: Proceedings of the international conference onsecurity and management (SAM), The steering committee of the worldcongress in computer science, computer engineering and appliedcomputing (WorldComp), p 178 Koikara R, Goswami M, Kim P-H, Lee G-J, Yoo K-Y (2015) Block-DCT based secret image sharing over gf (\(2\hat{\,\,}\) sup \(8\hat{\,\,}\)). In: Proceedings of the international conference onsecurity and management (SAM), The steering committee of the worldcongress in computer science, computer engineering and appliedcomputing (WorldComp), p 178
44.
go back to reference Koikara R, Deka DJ, Gogoi M, Das R (2015) A novel distributed image steganography method based on block-DCT. In: Advanced computer and communication engineering technology, Springer, Berlin, pp 423–435 Koikara R, Deka DJ, Gogoi M, Das R (2015) A novel distributed image steganography method based on block-DCT. In: Advanced computer and communication engineering technology, Springer, Berlin, pp 423–435
45.
go back to reference Nag A, Biswas S, Sarkar D, Sarkar PP (2014) A new (k, n) verifiable secret image sharing scheme (vsiss). Egypt Inform J 15(3):201–209 Nag A, Biswas S, Sarkar D, Sarkar PP (2014) A new (k, n) verifiable secret image sharing scheme (vsiss). Egypt Inform J 15(3):201–209
46.
go back to reference Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113MathSciNet Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113MathSciNet
47.
go back to reference Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49 Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49
48.
go back to reference Wu KS, Lo T-M (2013) An efficient secret image sharing scheme. Appl Math Mater 284:3025–3029 Wu KS, Lo T-M (2013) An efficient secret image sharing scheme. Appl Math Mater 284:3025–3029
50.
go back to reference Fang T-P (2011) Safe secret image sharing with fault tolerance key. IJCSNS Int J Comput Sci Netw Secur 11(9):20–23 Fang T-P (2011) Safe secret image sharing with fault tolerance key. IJCSNS Int J Comput Sci Netw Secur 11(9):20–23
51.
go back to reference Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772MATH Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772MATH
52.
go back to reference Fang W-P, Lin J-C (2006) Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int J Comput Netw Secur 6:228–234 Fang W-P, Lin J-C (2006) Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int J Comput Netw Secur 6:228–234
53.
go back to reference Chang Y-J, Lin S-J, Lin J-C (2008) Authentication and cross-recovery for multiple images. J Electron Imaging 17(4):043007 Chang Y-J, Lin S-J, Lin J-C (2008) Authentication and cross-recovery for multiple images. J Electron Imaging 17(4):043007
54.
go back to reference Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des Codes Cryptogr 40(1):81–102MathSciNetMATH Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des Codes Cryptogr 40(1):81–102MathSciNetMATH
55.
go back to reference Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24(3):255–278MathSciNetMATH Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24(3):255–278MathSciNetMATH
56.
go back to reference Wang K, Zou X., Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: Proceedings of the 33rd annual IEEE international computer software and applications conference, 2009. COMPSAC’09, vol 1. IEEE, pp 400–405 Wang K, Zou X., Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: Proceedings of the 33rd annual IEEE international computer software and applications conference, 2009. COMPSAC’09, vol 1. IEEE, pp 400–405
57.
go back to reference Adachi T, Okazaki C (2014) A multi-secret sharing scheme with many keys based on hermite interpolation. J Appl Math Phys 2(13):1196 Adachi T, Okazaki C (2014) A multi-secret sharing scheme with many keys based on hermite interpolation. J Appl Math Phys 2(13):1196
58.
go back to reference Feng B, Guo C, Li M, Wang Z-H (2015) A novel proactive multi-secret sharing scheme. IJ Netw Secur 17(2):123–128 Feng B, Guo C, Li M, Wang Z-H (2015) A novel proactive multi-secret sharing scheme. IJ Netw Secur 17(2):123–128
59.
go back to reference Li H, Cheng C, Pang L (2005) A new (t, n)-threshold multi-secret sharing scheme. In: International conference on computational and information science, Springer, Berlin, pp 421–426 Li H, Cheng C, Pang L (2005) A new (t, n)-threshold multi-secret sharing scheme. In: International conference on computational and information science, Springer, Berlin, pp 421–426
60.
go back to reference Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Pers Commun 95(2):1495–1504 Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Pers Commun 95(2):1495–1504
61.
go back to reference Hodeish ME, Bukauskas L, Humbe VT (2016) An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput Sci 93:760–767 Hodeish ME, Bukauskas L, Humbe VT (2016) An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput Sci 93:760–767
62.
go back to reference Tajan FSS, Dehkordi MH, Mirghadri A (2013) Reviewing multiple secret image sharing scheme based on matrix multiplication. Int J Comput Technol Appl 4(3):494 Tajan FSS, Dehkordi MH, Mirghadri A (2013) Reviewing multiple secret image sharing scheme based on matrix multiplication. Int J Comput Technol Appl 4(3):494
63.
go back to reference Rajput Aarti PK (2012) Multiple secret sharing scheme with gray-level mixing using evcs. Int J Comput Appl 4(2):24–29MathSciNet Rajput Aarti PK (2012) Multiple secret sharing scheme with gray-level mixing using evcs. Int J Comput Appl 4(2):24–29MathSciNet
64.
go back to reference Chen C-C, Tsai Y-H (2015) An expandable essential secret image sharing structure. J Inf Hiding Multimed Signal Process 7(1):135–144 Chen C-C, Tsai Y-H (2015) An expandable essential secret image sharing structure. J Inf Hiding Multimed Signal Process 7(1):135–144
65.
go back to reference Chang C-C, Lin P-Y, Wang Z-H, Li M (2010) A sudoku-based secret image sharing scheme with reversibility. JCM 5(1):5–12 Chang C-C, Lin P-Y, Wang Z-H, Li M (2010) A sudoku-based secret image sharing scheme with reversibility. JCM 5(1):5–12
66.
go back to reference Patel A (2016) Enhanced multi secret image sharing scheme for gray and RGB images. Int J Sci Res (IJSR) 5(2):1867–1871 Patel A (2016) Enhanced multi secret image sharing scheme for gray and RGB images. Int J Sci Res (IJSR) 5(2):1867–1871
67.
go back to reference Zhao Z, Luo H, Lu Z-M (2010) Shadow size reduction and multiple image secret sharing based on discrete fractional random transform. Inf Technol J 9:298–304 Zhao Z, Luo H, Lu Z-M (2010) Shadow size reduction and multiple image secret sharing based on discrete fractional random transform. Inf Technol J 9:298–304
68.
go back to reference Anbarasi J, Mala A (2015) Verifiable multi secret sharing scheme for 3D models. Int Arab J Inf Technol (IAJIT) 12:708–713 Anbarasi J, Mala A (2015) Verifiable multi secret sharing scheme for 3D models. Int Arab J Inf Technol (IAJIT) 12:708–713
69.
go back to reference Mohamed FP et al (2015) (n, n) secret color image sharing scheme with dynamic group. Int J Comput Netw Inf Secur 7(7):46 Mohamed FP et al (2015) (n, n) secret color image sharing scheme with dynamic group. Int J Comput Netw Inf Secur 7(7):46
70.
go back to reference Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869 Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869
71.
go back to reference Shyu SJ, Chuang C-C, Chen Y-R, Lai A-F (2009) Weighted threshold secret image sharing. In: Pacific-Rim symposium on image and video technology. Springer, Berlin, pp 988–998 Shyu SJ, Chuang C-C, Chen Y-R, Lai A-F (2009) Weighted threshold secret image sharing. In: Pacific-Rim symposium on image and video technology. Springer, Berlin, pp 988–998
72.
go back to reference Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the international conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp), p 318 Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the international conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp), p 318
73.
go back to reference Lin S-J, Chen LS-T, Lin J-C (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008 Lin S-J, Chen LS-T, Lin J-C (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008
74.
go back to reference Chen C-C, Fu W-Y, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577MathSciNet Chen C-C, Fu W-Y, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577MathSciNet
75.
go back to reference Yang C-C, Chang T-Y, Hwang M-S (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490MathSciNetMATH Yang C-C, Chang T-Y, Hwang M-S (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490MathSciNetMATH
76.
go back to reference Naskar PK, Khan HN, Chaudhuri A (2016) A key based secure threshold cryptography for secret image. IJ Netw Secur 18(1):68–81 Naskar PK, Khan HN, Chaudhuri A (2016) A key based secure threshold cryptography for secret image. IJ Netw Secur 18(1):68–81
77.
go back to reference Kumar RKBN, Kumar GR (2016) Secret image sharing technique based on bitwise xor. Int J Comput Sci Eng Technol 6(5):138–143 Kumar RKBN, Kumar GR (2016) Secret image sharing technique based on bitwise xor. Int J Comput Sci Eng Technol 6(5):138–143
78.
go back to reference Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785MATH Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785MATH
79.
go back to reference Patil S, Sathe S, Mehetre P, Shinde D, Bhalerao K, Pandey P (2013) Secure and verifiable (2, 2) secret sharing scheme for binary images. Int J Comput Sci Issues (IJCSI) 10(1):290 Patil S, Sathe S, Mehetre P, Shinde D, Bhalerao K, Pandey P (2013) Secure and verifiable (2, 2) secret sharing scheme for binary images. Int J Comput Sci Issues (IJCSI) 10(1):290
80.
go back to reference Bai L, Biswas S., Ortiz A, Dalessandro D (2006) An image secret sharing method. In: Proceedings of the 2006 9th international conference on information fusion. IEEE, pp 1–6 Bai L, Biswas S., Ortiz A, Dalessandro D (2006) An image secret sharing method. In: Proceedings of the 2006 9th international conference on information fusion. IEEE, pp 1–6
81.
go back to reference Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31–36 Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31–36
82.
go back to reference Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97MATH Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97MATH
83.
go back to reference Chen C-C, Wu W-J (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114 Chen C-C, Wu W-J (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
84.
go back to reference Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34 Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
85.
go back to reference Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683 Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683
86.
go back to reference Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594 Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594
87.
go back to reference Nag A, Biswas S, Sarkar D, Sarkar PP (2013) Image secret sharing in stego-images with authentication. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Berlin, pp 764–770 Nag A, Biswas S, Sarkar D, Sarkar PP (2013) Image secret sharing in stego-images with authentication. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Berlin, pp 764–770
88.
go back to reference Chen C-C, Liu C-AL (2013) Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22(1):013008 Chen C-C, Liu C-AL (2013) Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22(1):013008
89.
go back to reference Lin Y-T, Juan JS-T, Wang Y-C (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. In: Proceedings of the 2010 8th IEEE international conference on industrial informatics (INDIN). IEEE, pp 437–442 Lin Y-T, Juan JS-T, Wang Y-C (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. In: Proceedings of the 2010 8th IEEE international conference on industrial informatics (INDIN). IEEE, pp 437–442
90.
go back to reference Shyu S-J, Chen Y-R (2008) On secret multiple image sharing. In: Proceeding of the 25th workshop on combinatorial mathematics and computation theory. Citeseer, pp 24–25 Shyu S-J, Chen Y-R (2008) On secret multiple image sharing. In: Proceeding of the 25th workshop on combinatorial mathematics and computation theory. Citeseer, pp 24–25
91.
go back to reference Lee C-F, Juan JS-T (2009) An efficient and secure multi-secret image sharing scheme with general access structure. In: Proceedings of the third IEEE international conference on secure software integration and reliability improvement. SSIRI 2009. IEEE, pp 253–259 Lee C-F, Juan JS-T (2009) An efficient and secure multi-secret image sharing scheme with general access structure. In: Proceedings of the third IEEE international conference on secure software integration and reliability improvement. SSIRI 2009. IEEE, pp 253–259
92.
go back to reference Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433 Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433
93.
go back to reference Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: Proceedings of the 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697 Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: Proceedings of the 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697
94.
go back to reference Anbarasi LJ, Mala GA, Narendra M (2015) Dna based multi-secret image sharing. Procedia Comput Sci 46:1794–1801 Anbarasi LJ, Mala GA, Narendra M (2015) Dna based multi-secret image sharing. Procedia Comput Sci 46:1794–1801
95.
go back to reference Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91 Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91
96.
go back to reference Shyu SJ, Chen Y-R (2008) Threshold secret image sharing by Chinese remainder theorem. In: Asia-Pacific services computing conference. APSCC’08. IEEE, pp 1332–1337 Shyu SJ, Chen Y-R (2008) Threshold secret image sharing by Chinese remainder theorem. In: Asia-Pacific services computing conference. APSCC’08. IEEE, pp 1332–1337
97.
go back to reference Mignotte M (19821) How to share a secret. In: Workshop on cryptography, Springer, Berlin, pp 371–375 Mignotte M (19821) How to share a secret. In: Workshop on cryptography, Springer, Berlin, pp 371–375
98.
go back to reference Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170 Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170
99.
go back to reference Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03):1250023MathSciNetMATH Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03):1250023MathSciNetMATH
100.
go back to reference Shyu S-J, Chuang C-C, Chen Y-R, Lai A-F (2009) Sharing an image with variable-sized shadows. J Internet Technol 10(2):155–161 Shyu S-J, Chuang C-C, Chen Y-R, Lai A-F (2009) Sharing an image with variable-sized shadows. J Internet Technol 10(2):155–161
101.
go back to reference Chang C-C, Lin C-C, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recognit 42(11):3097–3114MATH Chang C-C, Lin C-C, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recognit 42(11):3097–3114MATH
102.
go back to reference Chen C-C, Chen J-L (2017) A new boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54 Chen C-C, Chen J-L (2017) A new boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54
103.
go back to reference Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55 Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55
104.
go back to reference Singh P, Raman B, Misra M (2017) A secure image sharing scheme based on SVD and fractional fourier transform. Signal Process Image Commun 57:46–59 Singh P, Raman B, Misra M (2017) A secure image sharing scheme based on SVD and fractional fourier transform. Signal Process Image Commun 57:46–59
105.
go back to reference Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291–302 Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291–302
106.
go back to reference Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32 Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32
107.
go back to reference Yang C-N, Hsieh C-L, Cai S-R (2014) Secret image sharing schemes by using maximum distance separable codes. Int J Mach Learn Comput 4(6):522 Yang C-N, Hsieh C-L, Cai S-R (2014) Secret image sharing schemes by using maximum distance separable codes. Int J Mach Learn Comput 4(6):522
108.
go back to reference Chang C-C, Huynh N-T, Chung T-F (2014) Efficient searching strategy for secret image sharing with meaningful shadows. Int J Mach Learn Comput 4(5):423 Chang C-C, Huynh N-T, Chung T-F (2014) Efficient searching strategy for secret image sharing with meaningful shadows. Int J Mach Learn Comput 4(5):423
109.
go back to reference Chien-Chang Chen Y-CL (2009) Weighted modulated secret image sharing method. J Electron Imaging 18(4):043011 Chien-Chang Chen Y-CL (2009) Weighted modulated secret image sharing method. J Electron Imaging 18(4):043011
110.
go back to reference Chi-Shiang Chan Y-CC, Yi-Hui Chen Y-Y T (2014) Role-balance based multi-secret images sharing using Boolean operations. KSII Trans Internet Inf Syst 8(5):1785–1800 Chi-Shiang Chan Y-CC, Yi-Hui Chen Y-Y T (2014) Role-balance based multi-secret images sharing using Boolean operations. KSII Trans Internet Inf Syst 8(5):1785–1800
111.
go back to reference Wang Z-H, Pizzolatti MS, Chang C-C (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69 Wang Z-H, Pizzolatti MS, Chang C-C (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69
Metadata
Title
A survey paper on secret image sharing schemes
Authors
Oinam Bidyapati Chanu
Arambam Neelima
Publication date
15-11-2018
Publisher
Springer London
Published in
International Journal of Multimedia Information Retrieval / Issue 4/2019
Print ISSN: 2192-6611
Electronic ISSN: 2192-662X
DOI
https://doi.org/10.1007/s13735-018-0161-3

Other articles of this Issue 4/2019

International Journal of Multimedia Information Retrieval 4/2019 Go to the issue

Premium Partner