Secret image sharing schemes: A comprehensive survey

S Saha, AK Chattopadhyay, AK Barman, A Nag… - IEEE …, 2023 - ieeexplore.ieee.org
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …

A verifiable multi-secret image sharing scheme using XOR operation and hash function

AK Chattopadhyay, A Nag, JP Singh… - Multimedia Tools and …, 2021 - Springer
In a secret image sharing (SIS) scheme, a dealer (the data owner or a trusted third-party)
encodes a secret image into some share images and distributes them among some …

XOR-based visual secret sharing scheme using pixel vectorization

SP Kannojia, J Kumar - Multimedia Tools and Applications, 2021 - Springer
The XOR operation has improved the recovery effect of the visual secret sharing schemes.
Various visual secret sharing schemes based on XOR operation are available in the …

Fully incrementing visual cryptography from a succinct non-monotonic structure

YC Chen - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
Visual cryptography (VC) is a variant form of secret sharing. In general threshold setting, the
k-out-of-n VC allows that, in a set of n participants, any k can recover and reconstruct the …

An efficient Boolean based multi-secret image sharing scheme

A Nag, JP Singh, AK Singh - Multimedia tools and applications, 2020 - Springer
The purpose of this paper is to develop an algorithm for sharing k secret images to n
participants in such a way that each participant gets a single share image by encoding all k …

An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares

AK Chattopadhyay, A Nag, JP Singh - Multimedia Tools and Applications, 2022 - Springer
A secret sharing scheme partitions a secret into a set of shares and distributes them among
the eligible participants, with each participant receiving one share of the secret. The sharing …

Prevention of cheating in visual cryptography by using coherent patterns

PY Lin, RZ Wang, YJ Chang, WP Fang - Information Sciences, 2015 - Elsevier
This paper proposes a simple method for establishing a visual cryptographic (VC) scheme
with the ability to prevent cheating. Given the n base-shares generated in a conventional (t …

A High‐Quality Authenticatable Visual Secret Sharing Scheme Using SGX

D Zhang, Z Gu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Visual cryptography scheme (VCS) is a secret‐sharing scheme which encrypts images as
shares and can decrypt shares without digital devices. Although a participant can reveal the …

A secret 3D model sharing scheme with reversible data hiding based on space subdivision

YY Tsai - 3D Research, 2016 - Springer
Secret sharing is a highly relevant research field, and its application to 2D images has been
thoroughly studied. However, secret sharing schemes have not kept pace with the advances …

Random grid and reversible watermarking-based on verifiable secret sharing for outsourcing images in cloud

H Gao, M Hu, T Gao, R Cheng - International Journal of Digital Crime …, 2018 - igi-global.com
A novel random grid and reversible watermarking based verifiable secret sharing scheme
for outsourcing image in cloud is proposed in the paper. In the proposed scheme, data …