CFP last date
20 May 2024
Reseach Article

A Survey on Various Visual Secret Sharing Schemes with an Application

by John Justin.m, Alagendran.b, Manimurugan.s
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 18
Year of Publication: 2012
Authors: John Justin.m, Alagendran.b, Manimurugan.s
10.5120/5639-7940

John Justin.m, Alagendran.b, Manimurugan.s . A Survey on Various Visual Secret Sharing Schemes with an Application. International Journal of Computer Applications. 41, 18 ( March 2012), 6-10. DOI=10.5120/5639-7940

@article{ 10.5120/5639-7940,
author = { John Justin.m, Alagendran.b, Manimurugan.s },
title = { A Survey on Various Visual Secret Sharing Schemes with an Application },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 18 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number18/5639-7940/ },
doi = { 10.5120/5639-7940 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:29:54.917575+05:30
%A John Justin.m
%A Alagendran.b
%A Manimurugan.s
%T A Survey on Various Visual Secret Sharing Schemes with an Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 18
%P 6-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper focuses mainly on the different kinds of Visual Secret sharing techniques that are existing, and framing all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available VSS techniques. Also focuses on the encryption techniques that are used in each schemes with their performance parameter, concentrates on to the security issues. This study extends to an application of the visual secret sharing scheme that embeds an extra confidential image with pair key structure with no pixel expansion.

References
  1. Du-Shiau Tsai , Gwoboa Horng , Tzung-Her Chen c, Yao-Te Huang " A novel secret image sharing scheme for true color images with size constraint" Information Sciences, vol. 179, pp. 3247–3254, 2009.
  2. T. H. Chen, K. H. Tsao, "Visual secret sharing by random grids ", Pattern Recognition, vol. 42, no. 9, pp. 2203–2217, 2009.
  3. T. H. Chen, K. H. Tsao, "Visual secret sharing by random grids revisited", Pattern Recognition, vol. 42, no. 9, pp. 2203–2217, 2009.
  4. J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, Y. P. Chu, "Visual secret sharing for multiple secrets", Pattern Recognition, vol. 41, no. 12, pp. 3572–3581 , 2008.
  5. Z. Wang, G. R. Arce, G. D. Grescenzo, "Halftone visual cryptography via error Diffusion", IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 383-396, 2009.
  6. C. N. Yang, "New visual secret sharing schemes using probabilistic method", Pattern Recognition Letters, vol. 25, no. 4, pp. 481–494, 2004.
  7. Tsung Lieh Lin et al, "A novel visual secret sharing (VSS) scheme for multiple secrets without pixel expansion", Expert Systems with Applications, vol. 37, pp. 7858–7869, 2010.
  8. Yung-Fu Chen , Yung-Kuan Chan , Ching-Chun Huang , Meng-Hsiun Tsai c, Yen-Ping Chu "A multiple-level visual secret-sharing scheme without image size expansion", Information Sciences, vol. 177 , pp. 4696–4710, 2007.
  9. Der- Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, Chwei Shyong Tsai, "A novel authenticable color visual secret sharing scheme using non-expanded meaningful shares", Elsevier on Displays,vol. 32,pp. 118-134,2011
  10. Tua, S-F,Houb, Y-C, "Design of visual cryptographic methods with smooth looking decoded images of invariant size for grey-level images", Imaging Science,vol. 55,pp. 90-101,2007.
  11. Y. -F. Chang,J. -B. Feng,,C. -S. Tsai,Y. -P. Chu,H. C. Syu, "New data hiding scheme using pixel swapping halftone images" The Imaging Science Journal, vol 56,pp no. 279 -290, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Open Multimedia Applications Platform Blind Source Separation Based Encryption Least Square Approximation Block-based Image Encryption Algorithm