CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

A Survey on Sharing Secret Image using NVSS Scheme

by Sejal Patel, Jyoti Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 16
Year of Publication: 2016
Authors: Sejal Patel, Jyoti Rao

Sejal Patel, Jyoti Rao . A Survey on Sharing Secret Image using NVSS Scheme. International Journal of Computer Applications. 133, 16 ( January 2016), 17-20. DOI=10.5120/ijca2016908154

@article{ 10.5120/ijca2016908154,
author = { Sejal Patel, Jyoti Rao },
title = { A Survey on Sharing Secret Image using NVSS Scheme },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 16 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016908154 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:31:26.308414+05:30
%A Sejal Patel
%A Jyoti Rao
%T A Survey on Sharing Secret Image using NVSS Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 16
%P 17-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Secret sharing is of great importance for sharing secret or confidential information. This information can be in the form of documents, images, photographs and many more. Most of the previous visual secret sharing scheme uses shares to conceal secret images. The shares may be printed or in digital form. When the secret image is hidden into the shares, noise-like pixel appears which increase the risk of transmission. Attackers look at image having noise-like pixels with suspicion and try to intercept the image. Thus image having noise is not safe for transmission over network. Due to this transmission risk is involved in visual secret sharing. In order to overcome such problems some authors have presented another scheme known as Natural image based Visual Secret Sharing Scheme (NVSS Scheme). In this scheme the transmission of secret image occurs through different media in order to protect the secret. The n out of n NVSS scheme can transmit a digital secret image by randomly choosing n-1 natural images and one noise share. Natural images may be in digital or printed form. Noise-like share is produced by natural image and printed image. The natural shares which are unaltered minimize the risk associated during transmission.

  1. Naor, Moni, and Adi Shamir. "Visual cryptography." Advances in Cryptology—EUROCRYPT'94. Springer Berlin/Heidelberg, 1995.
  2. Yang, Ching-Nung, and Chi-Sung Laih. "New colored visual secret sharing schemes." Designs, Codes and cryptography 20.3 (2000): 325-336.
  3. Yang, Ching-Nung. "New visual secret sharing schemes using probabilistic method." Pattern Recognition Letters 25.4 (2004): 481-494.
  4. Zhou, Zhi, Gonzalo R. Arce, and Giovanni Di Crescenzo. "Halftone visual cryptography." Image Processing, IEEE Transactions on 15.8 (2006): 2441-2453.
  5. T.H. Chen, K.H. Tsao, “Visual secret sharing by random grids ”, Pattern Recognition, vol. 42, no.9, pp.2203–2217, 2009.
  6. Lin, Tsung-Lieh, et al. "A novel visual secret sharing scheme for multiple secrets without pixel expansion." Expert systems with applications 37.12 (2010): 7858-7869.
  7. Lou, Der-Chyuan, et al. "A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares." Displays 32.3 (2011): 118-134.
  8. Alex, Nitty Sarah, and L. Jani Anbarasi. "Enhanced image secret sharing via error diffusion in halftone visual cryptography." Electronics Computer Technology (ICECT), 2011 3rd International Conference on. Vol. 2. IEEE, 2011.
  9. Shyu, Shyong Jian, and Kun Chen. "Visual multiple secret sharing based upon turning and flipping." Information Sciences 181.15 (2011): 3246-3266.
  10. Sasaki, Motoharu, and Yoshihiro Watanabe. "Formulation of visual secret sharing schemes encrypting multiple images." Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on. IEEE, 2014.
  11. Askari, Nazanin, Cecilia Moloney, and Howard M. Heys. "A novel visual secret sharing scheme without image size expansion." Electrical & Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference on. IEEE, 2012.
  12. Liu, Xiao-Yi, Ming-Song Chen, and Ya-Li Zhang. "A new color visual cryptography scheme with perfect contrast." Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on. IEEE, 2013.
  13. Tso, Hao-Kuan. "Secret Sharing Using Meaningful Images." Journal of Advanced Management Science 1.1 (2013).
  14. Chen, Tzung-Her, et al. "Quality-adaptive visual secret sharing by random grids." Journal of Systems and Software 86.5 (2013): 1267-1274.
  15. Lee, Kai-Hui, and Pei-Ling Chiu. "Digital image sharing by diverse image media." Information Forensics and Security, IEEE Transactions on 9.1 (2014): 88-98.
  16. Lin, Chih-Hung, et al. "Multi-factor cheating prevention in visual secret sharing by hybrid codebooks." Journal of Visual Communication and Image Representation 25.7 (2014): 1543-1557.
  17. Ulichney, Robert. "The void-and-cluster method for dither array generation."SPIE MILESTONE SERIES MS 154 (1999): 183-194.
Index Terms

Computer Science
Information Sciences


Natural images transmission risk visual secret sharing Natural Image based Visual Secret Sharing.