Abstract
Secret Sharing (SS) scheme divides a secret image into shadow images (referred to as shares) in a way that requires the shadows in a certain privileged coalition for the secret reconstruction. However, the secret image cannot be revealed if they are not combined in a prescribed way. In this paper, the evolution of the traditional secret sharing scheme to the contemporary of secret sharing scheme has been presented based on its technology adoption. The basic comparison between the traditional secret sharing scheme and Visual cryptography is presented. The image-based share generation process has been explained in the context of pixel sharing patterns and its process. The reconstruction image is obtained by the XOR /OR Boolean operation. The threshold-based share generation schemes are explained mathematically and the comparative analysis of these schemes also presented.
References
Feiste H. (1973) SCIENTIFIC. Sci Am a Div Nat Am Inc.; 228(5):15-23.
Bhattacharjee T, Maity SP, Islam SR (2018). Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Communication; 61(October 2017):21-32. Doi:10.1016/j.image.2017.10.012
Bhattacharjee T, Rout RK, Maity SP (2017). Affine Boolean classification in secret image sharing for progressive quality access control. Journal Information Security Applications; 33:16-29. Doi:10.1016/j.jisa.2017.01.001
BLAKLEY GR (2019). Safeguarding cryptographic keys. 313-318. Doi:10.1109/mark.1979.8817296
Blömer J. (2011), How to share a secret. Algorithms Unplug, 159-168. Doi: 10.1007/978-3-642-15328-0_17
Blundo C, Santis A De, Gargano L, Salerno U. (2014), Secret Sharing Schemes with Veto Capabilities.
Brindha K, Jeyanthi N. (2015), secured document sharing using visual cryptography in cloud data storage. Cybernetic Information Technology. 15(4):111-123. Doi: 10.1515/cait-2015-0058
Buckley N, Nagar AK, Arumugam S. (2015), On real-valued visual cryptographic basis matrices. Journal of Universal Computer Science; 21(12):1536-1562.
Chen T, Chang C, Wu C, Lou D. (2009), On the security of a copyright protection scheme based on visual cryptography. Computational Standard Interfaces; 31:1-5. Doi:10.1016/j.csi.2007.09.001
Chor B, Goldwasser S, Barucll A. (1985), Verifiable Secret Sh ~ lring and Acllieving Silnllll ~ llleity in the Presence of Falllts; (1):383-395. Doi:10.1109/SFCS.1985.64
Christiyana CC. (2014), A Secure Authentication Method for Grayscale Document Images; 2(March).
De Santis A, Ferrara AL, Masucci B. (2017), Visual cryptography schemes with reversing, Visual Cryptography Secret Image Sharing; 51(6):255-279. Doi: 10.1201/b11068
Du R, Li D, Varshney A. (2019), Geollery: A mixed reality social media platform. Conference Human Factors Computational System - Proc. ;( 1):1-2. doi:10.1145/3290605.3300915
Gentry C. (2009), Fully Homomorphic Encryption Using Ideal Lattices. Proceeding Annual ACM Symp Theory Computer: 169-178. Doi:10.1145/1536414.1536440
Hofmeister T, Krause M, Simon HU. (1997), Contrast-optimal k out of n secret sharing schemes in visual cryptography. Lecturer Notes Computer Science (including Subser Lecturer Notes Artificial Intelligent Lecturer Notes Bioinformatics); 1276:176-185.
Ito M, Saito A, Nishizeki T. (1989), Secret sharing scheme realizing general access structure. Electron Communication Japan (Part III Fundamental Electron Sci.); 72(9):56-64. Doi:10.1002/ecjc.4430720906
Lee SS, Na JC, Sohn SW, Park C, Seo DH, Kim SJ. (2002), Visual cryptography based on an interferometric encryption technique. ETRI J.; 24(5):373-380. Doi:10.4218/etrij.02.0102.0505
Lukac R, Plataniotis KN (2005). Bit-level based secret sharing for image encryption. Pattern Recognition; 38(5):767-772. Doi:10.1016/j.patcog.2004.11.010
Park G, Kim D. (2014), Lossless Codebook-Based Digital Watermarking Scheme with Authentication. Doi:10.1109/ITNG.2014.43
Punitha S, Thompson S, Siva Rama Lingam N. (2010), Binary watermarking technique based on visual cryptography. IEEE International Conference Communication Control Computer Technology ICCCCT 2010. : 232-235. Doi:10.1109/ICCCCT.2010.5670557
Qing S, Hideki I, Wang G. (2014), LNCS 4861 - Information and Communications Security. 2007; May. Doi: 10.1007/978-3-642-34129-8
Surekha B, Swamy GN. (2011), A Spatial domain public image watermarking. International Journal Security its Applications; 5(1):1-12.
Surekha B, Swamy GN, Rao KS, Kumar AR. (2016 ), A Watermarking Technique based on Visual Cryptography.
Tsai CS, Chag CC, Chen TS. (2002), Sharing multiple secrets in digital images. Journal System Software; 64(2):163-170. Doi: 10.1016/S0164-1212(02)00034-1.
Weir J, Yan WQ. (2009), Image hatching for visual cryptography. IMVIP 2009 - 2009 International Mach Visual Image Processing Conference; 8(September):59-64. Doi:10.1109/IMVIP.2009.18
Wu YS, Thien CC, Lin JC. (2004), Sharing and hiding secret images with size constraint. Pattern Recognition; 37(7):1377-1385. Doi:10.1016/j.patcog.2004.01.002
Yang CN, Chen TS. (2007), Extended visual secret sharing schemes: Improving the shadow image quality. International Journal Pattern Recognition Artificial Intelligence; 21(5):879-898. Doi: 10.1142/S0218001407005740
Naor M, Shamir A. (1994), Visual Cryptography. IEEE Explore.
Koresh, Mr H. James Deva. "Computer vision based traffic sign sensing for smart transport." Journal of Innovative Image Processing (JIIP) 1, no. 01 (2019): 11-19.
Lukac R, Stanco F, Battiato S, Gallo G, Lezoray O, Grady L. (2012), Digital Imaging and Computer Vision Series Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks, Image Processing and Analysis with Graphs: Theory and Practice.
Vinothkanna, Mr R. "A secure steganography creation algorithm for multiple file formats." Journal of Innovative Image Processing (JIIP) 1, no. 01 (2019): 20-30.
Praveena, A., and S. Smys. "Efficient cryptographic approach for data security in wireless sensor networks using MES VU." In 2016 10th international conference on intelligent systems and control (ISCO), pp. 1-6. IEEE, 2016
Smys, S. "Energy-aware security routing protocol for wsn in big-data applications." Journal of ISMAC 1, no. 01 (2019): 38-55.
