Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

Two secret sharing schemes based on Boolean operations

D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …

An extended visual cryptography algorithm for general access structures

KH Lee, PL Chiu - IEEE transactions on information forensics …, 2011 - ieeexplore.ieee.org
Conventional visual secret sharing schemes generate noise-like random pixels on shares to
hide secret images. It suffers a management problem, because of which dealers cannot …

On the relation of random grid and deterministic visual cryptography

R De Prisco, A De Santis - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Visual cryptography is a special type of secret sharing. Two models of visual cryptography
have been independently studied: 1) deterministic visual cryptography, introduced by Naor …

A new lossless secret color image sharing scheme with small shadow size

MK Sardar, A Adhikari - Journal of Visual Communication and Image …, 2020 - Elsevier
Though there have been many research works carried out on the grayscale secret image
sharing schemes, there is not sufficient research work available on the field of color secret …

Colored visual cryptography without color darkening

S Cimato, R De Prisco, A De Santis - Theoretical Computer Science, 2007 - Elsevier
In a visual cryptography scheme a secret image is encoded into n shares, in the form of
transparencies. The shares are then distributed to n participants. Qualified subsets of …

Essential secret image sharing scheme with small and equal sized shadows

MK Sardar, A Adhikari - Signal Processing: Image Communication, 2020 - Elsevier
In the literature of secret sharing, the property of essential secret sharing scheme ensures
that no set of participants, missing at least one essential participant, should be able to get …

Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images

A Adhikari - Designs, codes and cryptography, 2014 - Springer
Though the monochrome (black and white) visual cryptography has a very rich literature, a
very few papers have been published for the construction of general access structure. In this …

Maximal contrast color visual secret sharing schemes

S Dutta, A Adhikari, S Ruj - Designs, Codes and Cryptography, 2019 - Springer
The transition of visual secret sharing from a black & white secret image to a color image is
not straight-forward. There are several models of color superposition principle. In this paper …

[HTML][HTML] Color visual cryptography schemes for black and white secret images

R De Prisco, A De Santis - Theoretical Computer Science, 2013 - Elsevier
In this paper we propose the use of colors to improve visual cryptography schemes for black-
and-white secret images. The resulting model is called colored-black-and-white visual …