Abstract
With the speedy progress of network technology and internet applications, protection of digitized data against unauthorized access and modification has become a paramount issue. In order to face this challenge, numerous secret image sharing schemes have been introduced. Secret image sharing scheme is a method used for safeguarding the sensitive digitized image against illegal copying and tempering. The secret image is divided into many random shares in such a way that each share does not reveal any information to the intruders. In this paper, we present a comprehensive survey from over 100 papers which explains the new approaches and challenges. This paper also provides a comparative analysis of different methods based on different properties.


















Similar content being viewed by others
References
Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing. In: Proceedings of the 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1661–1666
Tsai M-H, Chen C-C (2013) A study on secret image sharing. In: Proceedings of the 6th international workshop on image media quality and its applications, Tokyo, Japan. Citeseer, pp 135–139
Shamir A (1979) How to share a secret. Commun ACM 12(11):612–613
Blakley GR et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317
Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770
Nair DG, Binu V, Kumar GS, An improved e-voting scheme using secret sharing based secure multi-party computation. arXiv preprint arXiv:1502.07469
Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Wu C-C, Hwang M-S, Kao S-J (2009) A new approach to the secret image sharing with steganography and authentication. Imaging Sci J 57(3):140–151
Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41(10):3130–3137
Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognit 43(1):397–404
Yang C-N, Ouyang J-F, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735
Singh A, Jauhari U (2012) A symmetric steganography with secret sharing and psnr analysis for image steganography. Int J Sci Eng Res 3(6):2–8
Girdhar A, Kaur A (2013) Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International conference on innovations in engineering and technology, pp 58–61
Bal RG, Ezhilarasu DP (2014) An efficient safe and secured video steganography using shadow derivation. Int J Innov Res Comput Commun Eng 2(3):3251–3258
Metri P, Desai S (2014) Performance analysis of secret sharing algorithm. J Eng Comput ApplSci 3(7):51–55
Sehgal N, Goel A (2014) Evolution in image steganography. Int J Inf Comput Technol 4:1221–1227
Liu L, Wang A, Chang C-C, Li Z (2017) A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding. IJ Netw Secur 19(3):327–334
Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
Lee C-W (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the png image with a data repair capability. IEEE Trans Image Process 21(1):207–218
Tulasidasu M, Sirisha BL, Reddy KR (2015) Steganography based secret image sharing using block division technique. In: Proceedings of the 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1173–1176
Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. In: International workshop on security protocols. Springer, Berlin, pp 197–202
Kandar S, Maiti A, Dhara BC (2011) Visual cryptography scheme forcolor image using random number with enveloping by digitalwatermarking. Int J Comput Sci Issues (IJCSI) 8(3):543
Anandhi S (2012) Satthiyaraj, embedded visual cryptography schemes for secret images. IJCSNS Int J Comput Sci Netw Secur 12(12):153–158
Sharma S (2013) An implementation of a novel secret image sharing algorithm. Int J Comput Sci Mob Comput 2(4):263–268
Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for secret image sharing using gas algorithm. Int J Comput Appl 92(8):11–16
Thorat SMK, Dhanashri NR, Patil D (2016) Embedded visual cryptography for secret color images sharing using stamping algorithm, encryption and decryption technique. Int J Adv Res Comput Commun Eng 5(6):37–42
Padiya IM, Dalvi G (2014) Encrypting multiple images using visual secret sharing scheme. Int J Sci Res (IJSR) 3(10):107–111
Shetty S, Abraham MP (2015) A secure visual cryptography scheme for sharing secret image using RSA. Int J Innov Res Comput Commun Eng 3(4):3331–3336
Bhadran R (2015) An improved visual cryptography scheme for colour images. Int Res J Eng Technol 2(5):1391–1395
Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng, ISSN (Online), pp 2278–1021
Durgamba MNSS, Samson Ch (2015) Multiple image sharing scheme using visual cryptography. Int J Adv Res Comput Sci Softw Eng 5(8):134–137
Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28(12):1600–1610
Lin S-J, Lin J-C (2007) Vcpss: a two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognit 40(12):3652–3666
Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. In: Proceedings of the 2011 international conference on information and electronics engineering IPCSIT, vol 6. IEEE, Washington, pp 171–175
Surekha B, Swamy G (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci Issues (IJCSI) 9(3):312–317
Dharwadkar NV, Amberker B (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100
Rani A, Bhullar AK, Dangwal D, Kumar S (2015) A zero-watermarking scheme using discrete wavelet transform. Procedia Comput Sci 70:603–609
Kong J, Zhang Y, Meng X, Zheng Y, Lu Y (2007) A scalable secret image sharing method based on discrete wavelet transform. In: International conference on life system modeling and simulation, Springer, Berlin, pp 736–745
Hashim AT, George LE (2013) Secret image sharing based on wavelet transform. In: International conference on information technology in signal and image processing, Mumbai, India, pp 324–332
Huang C-P, Li C-C (2006) A secret image sharing method using integer-to-integer wavelet transform. In: Null. IEEE, pp 802–805
Fang W-P et al (2007) Quality controllable progressive secret image sharingdiscrete cosine transform approach. Int J Educ Inf Technol 1:43–47
Koikara R, Goswami M, Kim P-H, Lee G-J, Yoo K-Y (2015) Block-DCT based secret image sharing over gf (\(2\hat{\,\,}\) sup \(8\hat{\,\,}\)). In: Proceedings of the international conference onsecurity and management (SAM), The steering committee of the worldcongress in computer science, computer engineering and appliedcomputing (WorldComp), p 178
Koikara R, Deka DJ, Gogoi M, Das R (2015) A novel distributed image steganography method based on block-DCT. In: Advanced computer and communication engineering technology, Springer, Berlin, pp 423–435
Nag A, Biswas S, Sarkar D, Sarkar PP (2014) A new (k, n) verifiable secret image sharing scheme (vsiss). Egypt Inform J 15(3):201–209
Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113
Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49
Wu KS, Lo T-M (2013) An efficient secret image sharing scheme. Appl Math Mater 284:3025–3029
Tompa M, Woll H (1989) How to share a secret with cheaters. J Cryptol 1(3):133–138
Fang T-P (2011) Safe secret image sharing with fault tolerance key. IJCSNS Int J Comput Sci Netw Secur 11(9):20–23
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772
Fang W-P, Lin J-C (2006) Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int J Comput Netw Secur 6:228–234
Chang Y-J, Lin S-J, Lin J-C (2008) Authentication and cross-recovery for multiple images. J Electron Imaging 17(4):043007
Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des Codes Cryptogr 40(1):81–102
Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24(3):255–278
Wang K, Zou X., Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: Proceedings of the 33rd annual IEEE international computer software and applications conference, 2009. COMPSAC’09, vol 1. IEEE, pp 400–405
Adachi T, Okazaki C (2014) A multi-secret sharing scheme with many keys based on hermite interpolation. J Appl Math Phys 2(13):1196
Feng B, Guo C, Li M, Wang Z-H (2015) A novel proactive multi-secret sharing scheme. IJ Netw Secur 17(2):123–128
Li H, Cheng C, Pang L (2005) A new (t, n)-threshold multi-secret sharing scheme. In: International conference on computational and information science, Springer, Berlin, pp 421–426
Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Pers Commun 95(2):1495–1504
Hodeish ME, Bukauskas L, Humbe VT (2016) An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput Sci 93:760–767
Tajan FSS, Dehkordi MH, Mirghadri A (2013) Reviewing multiple secret image sharing scheme based on matrix multiplication. Int J Comput Technol Appl 4(3):494
Rajput Aarti PK (2012) Multiple secret sharing scheme with gray-level mixing using evcs. Int J Comput Appl 4(2):24–29
Chen C-C, Tsai Y-H (2015) An expandable essential secret image sharing structure. J Inf Hiding Multimed Signal Process 7(1):135–144
Chang C-C, Lin P-Y, Wang Z-H, Li M (2010) A sudoku-based secret image sharing scheme with reversibility. JCM 5(1):5–12
Patel A (2016) Enhanced multi secret image sharing scheme for gray and RGB images. Int J Sci Res (IJSR) 5(2):1867–1871
Zhao Z, Luo H, Lu Z-M (2010) Shadow size reduction and multiple image secret sharing based on discrete fractional random transform. Inf Technol J 9:298–304
Anbarasi J, Mala A (2015) Verifiable multi secret sharing scheme for 3D models. Int Arab J Inf Technol (IAJIT) 12:708–713
Mohamed FP et al (2015) (n, n) secret color image sharing scheme with dynamic group. Int J Comput Netw Inf Secur 7(7):46
Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869
Shyu SJ, Chuang C-C, Chen Y-R, Lai A-F (2009) Weighted threshold secret image sharing. In: Pacific-Rim symposium on image and video technology. Springer, Berlin, pp 988–998
Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the international conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp), p 318
Lin S-J, Chen LS-T, Lin J-C (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008
Chen C-C, Fu W-Y, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577
Yang C-C, Chang T-Y, Hwang M-S (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490
Naskar PK, Khan HN, Chaudhuri A (2016) A key based secure threshold cryptography for secret image. IJ Netw Secur 18(1):68–81
Kumar RKBN, Kumar GR (2016) Secret image sharing technique based on bitwise xor. Int J Comput Sci Eng Technol 6(5):138–143
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785
Patil S, Sathe S, Mehetre P, Shinde D, Bhalerao K, Pandey P (2013) Secure and verifiable (2, 2) secret sharing scheme for binary images. Int J Comput Sci Issues (IJCSI) 10(1):290
Bai L, Biswas S., Ortiz A, Dalessandro D (2006) An image secret sharing method. In: Proceedings of the 2006 9th international conference on information fusion. IEEE, pp 1–6
Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31–36
Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97
Chen C-C, Wu W-J (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683
Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594
Nag A, Biswas S, Sarkar D, Sarkar PP (2013) Image secret sharing in stego-images with authentication. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Berlin, pp 764–770
Chen C-C, Liu C-AL (2013) Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22(1):013008
Lin Y-T, Juan JS-T, Wang Y-C (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. In: Proceedings of the 2010 8th IEEE international conference on industrial informatics (INDIN). IEEE, pp 437–442
Shyu S-J, Chen Y-R (2008) On secret multiple image sharing. In: Proceeding of the 25th workshop on combinatorial mathematics and computation theory. Citeseer, pp 24–25
Lee C-F, Juan JS-T (2009) An efficient and secure multi-secret image sharing scheme with general access structure. In: Proceedings of the third IEEE international conference on secure software integration and reliability improvement. SSIRI 2009. IEEE, pp 253–259
Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433
Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: Proceedings of the 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697
Anbarasi LJ, Mala GA, Narendra M (2015) Dna based multi-secret image sharing. Procedia Comput Sci 46:1794–1801
Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91
Shyu SJ, Chen Y-R (2008) Threshold secret image sharing by Chinese remainder theorem. In: Asia-Pacific services computing conference. APSCC’08. IEEE, pp 1332–1337
Mignotte M (19821) How to share a secret. In: Workshop on cryptography, Springer, Berlin, pp 371–375
Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170
Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03):1250023
Shyu S-J, Chuang C-C, Chen Y-R, Lai A-F (2009) Sharing an image with variable-sized shadows. J Internet Technol 10(2):155–161
Chang C-C, Lin C-C, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recognit 42(11):3097–3114
Chen C-C, Chen J-L (2017) A new boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54
Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55
Singh P, Raman B, Misra M (2017) A secure image sharing scheme based on SVD and fractional fourier transform. Signal Process Image Commun 57:46–59
Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291–302
Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32
Yang C-N, Hsieh C-L, Cai S-R (2014) Secret image sharing schemes by using maximum distance separable codes. Int J Mach Learn Comput 4(6):522
Chang C-C, Huynh N-T, Chung T-F (2014) Efficient searching strategy for secret image sharing with meaningful shadows. Int J Mach Learn Comput 4(5):423
Chien-Chang Chen Y-CL (2009) Weighted modulated secret image sharing method. J Electron Imaging 18(4):043011
Chi-Shiang Chan Y-CC, Yi-Hui Chen Y-Y T (2014) Role-balance based multi-secret images sharing using Boolean operations. KSII Trans Internet Inf Syst 8(5):1785–1800
Wang Z-H, Pizzolatti MS, Chang C-C (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chanu, O.B., Neelima, A. A survey paper on secret image sharing schemes. Int J Multimed Info Retr 8, 195–215 (2019). https://doi.org/10.1007/s13735-018-0161-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13735-018-0161-3