Skip to main content
Log in

A survey paper on secret image sharing schemes

  • Trends and Surveys
  • Published:
International Journal of Multimedia Information Retrieval Aims and scope Submit manuscript

Abstract

With the speedy progress of network technology and internet applications, protection of digitized data against unauthorized access and modification has become a paramount issue. In order to face this challenge, numerous secret image sharing schemes have been introduced. Secret image sharing scheme is a method used for safeguarding the sensitive digitized image against illegal copying and tempering. The secret image is divided into many random shares in such a way that each share does not reveal any information to the intruders. In this paper, we present a comprehensive survey from over 100 papers which explains the new approaches and challenges. This paper also provides a comparative analysis of different methods based on different properties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Alharthi S, Atrey PK (2010) An improved scheme for secret image sharing. In: Proceedings of the 2010 IEEE international conference on multimedia and expo (ICME). IEEE, pp 1661–1666

  2. Tsai M-H, Chen C-C (2013) A study on secret image sharing. In: Proceedings of the 6th international workshop on image media quality and its applications, Tokyo, Japan. Citeseer, pp 135–139

  3. Shamir A (1979) How to share a secret. Commun ACM 12(11):612–613

    MathSciNet  MATH  Google Scholar 

  4. Blakley GR et al. (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317

  5. Thien C-C, Lin J-C (2002) Secret image sharing. Comput Graph 26(5):765–770

    Google Scholar 

  6. Nair DG, Binu V, Kumar GS, An improved e-voting scheme using secret sharing based secure multi-party computation. arXiv preprint arXiv:1502.07469

  7. Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Google Scholar 

  8. Yang C-N, Chen T-S, Yu KH, Wang C-C (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Google Scholar 

  9. Wu C-C, Hwang M-S, Kao S-J (2009) A new approach to the secret image sharing with steganography and authentication. Imaging Sci J 57(3):140–151

    Google Scholar 

  10. Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recognit 41(10):3130–3137

    MATH  Google Scholar 

  11. Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recognit 43(1):397–404

    MATH  Google Scholar 

  12. Yang C-N, Ouyang J-F, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735

    Google Scholar 

  13. Singh A, Jauhari U (2012) A symmetric steganography with secret sharing and psnr analysis for image steganography. Int J Sci Eng Res 3(6):2–8

    Google Scholar 

  14. Girdhar A, Kaur A (2013) Secret image sharing scheme with steganography and authentication based on discrete wavelet transform. In: International conference on innovations in engineering and technology, pp 58–61

  15. Bal RG, Ezhilarasu DP (2014) An efficient safe and secured video steganography using shadow derivation. Int J Innov Res Comput Commun Eng 2(3):3251–3258

    Google Scholar 

  16. Metri P, Desai S (2014) Performance analysis of secret sharing algorithm. J Eng Comput ApplSci 3(7):51–55

    Google Scholar 

  17. Sehgal N, Goel A (2014) Evolution in image steganography. Int J Inf Comput Technol 4:1221–1227

    Google Scholar 

  18. Liu L, Wang A, Chang C-C, Li Z (2017) A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding. IJ Netw Secur 19(3):327–334

    Google Scholar 

  19. Wang R-Z, Shyu S-J (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373

    Google Scholar 

  20. Lee C-W (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the png image with a data repair capability. IEEE Trans Image Process 21(1):207–218

    MathSciNet  MATH  Google Scholar 

  21. Tulasidasu M, Sirisha BL, Reddy KR (2015) Steganography based secret image sharing using block division technique. In: Proceedings of the 2015 international conference on computational intelligence and communication networks (CICN). IEEE, pp 1173–1176

  22. Naor M, Shamir A (1996) Visual cryptography II: improving the contrast via the cover base. In: International workshop on security protocols. Springer, Berlin, pp 197–202

    Google Scholar 

  23. Kandar S, Maiti A, Dhara BC (2011) Visual cryptography scheme forcolor image using random number with enveloping by digitalwatermarking. Int J Comput Sci Issues (IJCSI) 8(3):543

    Google Scholar 

  24. Anandhi S (2012) Satthiyaraj, embedded visual cryptography schemes for secret images. IJCSNS Int J Comput Sci Netw Secur 12(12):153–158

    Google Scholar 

  25. Sharma S (2013) An implementation of a novel secret image sharing algorithm. Int J Comput Sci Mob Comput 2(4):263–268

    Google Scholar 

  26. Bharanivendhan N, Amitha T (2014) Visual cryptography schemes for secret image sharing using gas algorithm. Int J Comput Appl 92(8):11–16

    Google Scholar 

  27. Thorat SMK, Dhanashri NR, Patil D (2016) Embedded visual cryptography for secret color images sharing using stamping algorithm, encryption and decryption technique. Int J Adv Res Comput Commun Eng 5(6):37–42

    Google Scholar 

  28. Padiya IM, Dalvi G (2014) Encrypting multiple images using visual secret sharing scheme. Int J Sci Res (IJSR) 3(10):107–111

    Google Scholar 

  29. Shetty S, Abraham MP (2015) A secure visual cryptography scheme for sharing secret image using RSA. Int J Innov Res Comput Commun Eng 3(4):3331–3336

    Google Scholar 

  30. Bhadran R (2015) An improved visual cryptography scheme for colour images. Int Res J Eng Technol 2(5):1391–1395

    Google Scholar 

  31. Karolin M, Meyyapan DT (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng, ISSN (Online), pp 2278–1021

  32. Durgamba MNSS, Samson Ch (2015) Multiple image sharing scheme using visual cryptography. Int J Adv Res Comput Sci Softw Eng 5(8):134–137

    Google Scholar 

  33. Yang C-N, Ciou C-B (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28(12):1600–1610

    Google Scholar 

  34. Lin S-J, Lin J-C (2007) Vcpss: a two-in-one two-decoding-options image sharing method combining visual cryptography (vc) and polynomial-style sharing (pss) approaches. Pattern Recognit 40(12):3652–3666

    MATH  Google Scholar 

  35. Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. In: Proceedings of the 2011 international conference on information and electronics engineering IPCSIT, vol 6. IEEE, Washington, pp 171–175

  36. Surekha B, Swamy G (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci Issues (IJCSI) 9(3):312–317

    Google Scholar 

  37. Dharwadkar NV, Amberker B (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int J Signal Process 6(2):93–100

    Google Scholar 

  38. Rani A, Bhullar AK, Dangwal D, Kumar S (2015) A zero-watermarking scheme using discrete wavelet transform. Procedia Comput Sci 70:603–609

    Google Scholar 

  39. Kong J, Zhang Y, Meng X, Zheng Y, Lu Y (2007) A scalable secret image sharing method based on discrete wavelet transform. In: International conference on life system modeling and simulation, Springer, Berlin, pp 736–745

  40. Hashim AT, George LE (2013) Secret image sharing based on wavelet transform. In: International conference on information technology in signal and image processing, Mumbai, India, pp 324–332

  41. Huang C-P, Li C-C (2006) A secret image sharing method using integer-to-integer wavelet transform. In: Null. IEEE, pp 802–805

  42. Fang W-P et al (2007) Quality controllable progressive secret image sharingdiscrete cosine transform approach. Int J Educ Inf Technol 1:43–47

    Google Scholar 

  43. Koikara R, Goswami M, Kim P-H, Lee G-J, Yoo K-Y (2015) Block-DCT based secret image sharing over gf (\(2\hat{\,\,}\) sup \(8\hat{\,\,}\)). In: Proceedings of the international conference onsecurity and management (SAM), The steering committee of the worldcongress in computer science, computer engineering and appliedcomputing (WorldComp), p 178

  44. Koikara R, Deka DJ, Gogoi M, Das R (2015) A novel distributed image steganography method based on block-DCT. In: Advanced computer and communication engineering technology, Springer, Berlin, pp 423–435

    Google Scholar 

  45. Nag A, Biswas S, Sarkar D, Sarkar PP (2014) A new (k, n) verifiable secret image sharing scheme (vsiss). Egypt Inform J 15(3):201–209

    Google Scholar 

  46. Nag A, Biswas S, Sarkar D, Sarka PP (2014) Secret image sharing scheme based on a Boolean operation. Cybern Inf Technol 14(2):98–113

    MathSciNet  Google Scholar 

  47. Wu K-S (2013) A secret image sharing scheme for light images. EURASIP J Adv Signal Process 2013(1):49

    Google Scholar 

  48. Wu KS, Lo T-M (2013) An efficient secret image sharing scheme. Appl Math Mater 284:3025–3029

    Google Scholar 

  49. Tompa M, Woll H (1989) How to share a secret with cheaters. J Cryptol 1(3):133–138

    MathSciNet  MATH  Google Scholar 

  50. Fang T-P (2011) Safe secret image sharing with fault tolerance key. IJCSNS Int J Comput Sci Netw Secur 11(9):20–23

    Google Scholar 

  51. Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recognit 38(5):767–772

    MATH  Google Scholar 

  52. Fang W-P, Lin J-C (2006) Multi-channel secret image transmission with fast decoding: by using bit-level sharing and economic-size shares. Int J Comput Netw Secur 6:228–234

    Google Scholar 

  53. Chang Y-J, Lin S-J, Lin J-C (2008) Authentication and cross-recovery for multiple images. J Electron Imaging 17(4):043007

    Google Scholar 

  54. Koga H, Ueda E (2006) Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels. Des Codes Cryptogr 40(1):81–102

    MathSciNet  MATH  Google Scholar 

  55. Blundo C, De Bonis A, De Santis A (2001) Improved schemes for visual cryptography. Des Codes Cryptogr 24(3):255–278

    MathSciNet  MATH  Google Scholar 

  56. Wang K, Zou X., Sui Y (2009) A multiple secret sharing scheme based on matrix projection. In: Proceedings of the 33rd annual IEEE international computer software and applications conference, 2009. COMPSAC’09, vol 1. IEEE, pp 400–405

  57. Adachi T, Okazaki C (2014) A multi-secret sharing scheme with many keys based on hermite interpolation. J Appl Math Phys 2(13):1196

    Google Scholar 

  58. Feng B, Guo C, Li M, Wang Z-H (2015) A novel proactive multi-secret sharing scheme. IJ Netw Secur 17(2):123–128

    Google Scholar 

  59. Li H, Cheng C, Pang L (2005) A new (t, n)-threshold multi-secret sharing scheme. In: International conference on computational and information science, Springer, Berlin, pp 421–426

    Google Scholar 

  60. Harn L, Hsu C-F (2017) (t, n) multi-secret sharing scheme based on bivariate polynomial. Wirel Pers Commun 95(2):1495–1504

    Google Scholar 

  61. Hodeish ME, Bukauskas L, Humbe VT (2016) An optimal (k, n) visual secret sharing scheme for information security. Procedia Comput Sci 93:760–767

    Google Scholar 

  62. Tajan FSS, Dehkordi MH, Mirghadri A (2013) Reviewing multiple secret image sharing scheme based on matrix multiplication. Int J Comput Technol Appl 4(3):494

    Google Scholar 

  63. Rajput Aarti PK (2012) Multiple secret sharing scheme with gray-level mixing using evcs. Int J Comput Appl 4(2):24–29

    MathSciNet  Google Scholar 

  64. Chen C-C, Tsai Y-H (2015) An expandable essential secret image sharing structure. J Inf Hiding Multimed Signal Process 7(1):135–144

    Google Scholar 

  65. Chang C-C, Lin P-Y, Wang Z-H, Li M (2010) A sudoku-based secret image sharing scheme with reversibility. JCM 5(1):5–12

    Google Scholar 

  66. Patel A (2016) Enhanced multi secret image sharing scheme for gray and RGB images. Int J Sci Res (IJSR) 5(2):1867–1871

    Google Scholar 

  67. Zhao Z, Luo H, Lu Z-M (2010) Shadow size reduction and multiple image secret sharing based on discrete fractional random transform. Inf Technol J 9:298–304

    Google Scholar 

  68. Anbarasi J, Mala A (2015) Verifiable multi secret sharing scheme for 3D models. Int Arab J Inf Technol (IAJIT) 12:708–713

    Google Scholar 

  69. Mohamed FP et al (2015) (n, n) secret color image sharing scheme with dynamic group. Int J Comput Netw Inf Secur 7(7):46

    Google Scholar 

  70. Lin T-L, Horng S-J, Lee K-H, Chiu P-L, Kao T-W, Chen Y-H, Run R-S, Lai J-L, Chen R-J (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869

    Google Scholar 

  71. Shyu SJ, Chuang C-C, Chen Y-R, Lai A-F (2009) Weighted threshold secret image sharing. In: Pacific-Rim symposium on image and video technology. Springer, Berlin, pp 988–998

    Google Scholar 

  72. Koikara R, Paul A, Yoo K-Y (2016) Multilevel threshold secret image sharing based on the Chinese remainder theorem. In: Proceedings of the international conference on security and management (SAM), the steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp), p 318

  73. Lin S-J, Chen LS-T, Lin J-C (2009) Fast-weighted secret image sharing. Opt Eng 48(7):077008

    Google Scholar 

  74. Chen C-C, Fu W-Y, Chen C-C (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24(5):1567–1577

    MathSciNet  Google Scholar 

  75. Yang C-C, Chang T-Y, Hwang M-S (2004) A (t, n) multi-secret sharing scheme. Appl Math Comput 151(2):483–490

    MathSciNet  MATH  Google Scholar 

  76. Naskar PK, Khan HN, Chaudhuri A (2016) A key based secure threshold cryptography for secret image. IJ Netw Secur 18(1):68–81

    Google Scholar 

  77. Kumar RKBN, Kumar GR (2016) Secret image sharing technique based on bitwise xor. Int J Comput Sci Eng Technol 6(5):138–143

    Google Scholar 

  78. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. Pattern Recognit 40(10):2776–2785

    MATH  Google Scholar 

  79. Patil S, Sathe S, Mehetre P, Shinde D, Bhalerao K, Pandey P (2013) Secure and verifiable (2, 2) secret sharing scheme for binary images. Int J Comput Sci Issues (IJCSI) 10(1):290

    Google Scholar 

  80. Bai L, Biswas S., Ortiz A, Dalessandro D (2006) An image secret sharing method. In: Proceedings of the 2006 9th international conference on information fusion. IEEE, pp 1–6

  81. Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic and secure computing. IEEE, pp 31–36

  82. Chen T-H, Wu C-S (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    MATH  Google Scholar 

  83. Chen C-C, Wu W-J (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Google Scholar 

  84. Yang C-N, Chen C-H, Cai S-R (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Google Scholar 

  85. Rajput M, Deshmukh M (2016) Secure (n, n+ 1)-multi secret image sharing scheme using additive modulo. Procedia Comput Sci 89:677–683

    Google Scholar 

  86. Guo C, Zhang H, Song Q, Li M (2016) A multi-threshold secret image sharing scheme based on the generalized chinese reminder theorem. Multimed Tools Appl 75(18):11577–11594

    Google Scholar 

  87. Nag A, Biswas S, Sarkar D, Sarkar PP (2013) Image secret sharing in stego-images with authentication. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Berlin, pp 764–770

    Google Scholar 

  88. Chen C-C, Liu C-AL (2013) Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22(1):013008

    Google Scholar 

  89. Lin Y-T, Juan JS-T, Wang Y-C (2010) A secure and efficient multi-use multi-secret images sharing scheme for general access structure. In: Proceedings of the 2010 8th IEEE international conference on industrial informatics (INDIN). IEEE, pp 437–442

  90. Shyu S-J, Chen Y-R (2008) On secret multiple image sharing. In: Proceeding of the 25th workshop on combinatorial mathematics and computation theory. Citeseer, pp 24–25

  91. Lee C-F, Juan JS-T (2009) An efficient and secure multi-secret image sharing scheme with general access structure. In: Proceedings of the third IEEE international conference on secure software integration and reliability improvement. SSIRI 2009. IEEE, pp 253–259

  92. Meghrajani YK, Mazumdar HS (2016) Universal share for multisecret image sharing scheme based on boolean operation. IEEE Signal Process Lett 23(10):1429–1433

    Google Scholar 

  93. Deshmukh M, Nain N, Ahmed M (2016) An (n, n)-multi secret image sharing scheme using Boolean XOR and modular arithmetic. In: Proceedings of the 2016 IEEE 30th international conference on advanced information networking and applications (AINA). IEEE, pp 690–697

  94. Anbarasi LJ, Mala GA, Narendra M (2015) Dna based multi-secret image sharing. Procedia Comput Sci 46:1794–1801

    Google Scholar 

  95. Guo C, Chang C-C, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recognit Lett 33(1):83–91

    Google Scholar 

  96. Shyu SJ, Chen Y-R (2008) Threshold secret image sharing by Chinese remainder theorem. In: Asia-Pacific services computing conference. APSCC’08. IEEE, pp 1332–1337

  97. Mignotte M (19821) How to share a secret. In: Workshop on cryptography, Springer, Berlin, pp 371–375

  98. Chang C-C, Huynh N-T, Le H-D (2014) Lossless and unlimited multi-image sharing based on chinese remainder theorem and lagrange interpolation. Signal Process 99:159–170

    Google Scholar 

  99. Hu C, Liao X, Xiao D (2012) Secret image sharing based on chaotic map and chinese remainder theorem. Int J Wavelets Multiresolution Inf Process 10(03):1250023

    MathSciNet  MATH  Google Scholar 

  100. Shyu S-J, Chuang C-C, Chen Y-R, Lai A-F (2009) Sharing an image with variable-sized shadows. J Internet Technol 10(2):155–161

    Google Scholar 

  101. Chang C-C, Lin C-C, Le THN, Le HB (2009) Sharing a verifiable secret image using two shadows. Pattern Recognit 42(11):3097–3114

    MATH  Google Scholar 

  102. Chen C-C, Chen J-L (2017) A new boolean-based multiple secret image sharing scheme to share different sized secret images. J Inf Secur Appl 33:45–54

    Google Scholar 

  103. Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55

    Google Scholar 

  104. Singh P, Raman B, Misra M (2017) A secure image sharing scheme based on SVD and fractional fourier transform. Signal Process Image Commun 57:46–59

    Google Scholar 

  105. Deshmukh M, Nain N, Ahmed M (2017) A novel approach for sharing multiple color images by employing chinese remainder theorem. J Vis Commun Image Represent 49:291–302

    Google Scholar 

  106. Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32

    Google Scholar 

  107. Yang C-N, Hsieh C-L, Cai S-R (2014) Secret image sharing schemes by using maximum distance separable codes. Int J Mach Learn Comput 4(6):522

    Google Scholar 

  108. Chang C-C, Huynh N-T, Chung T-F (2014) Efficient searching strategy for secret image sharing with meaningful shadows. Int J Mach Learn Comput 4(5):423

    Google Scholar 

  109. Chien-Chang Chen Y-CL (2009) Weighted modulated secret image sharing method. J Electron Imaging 18(4):043011

    Google Scholar 

  110. Chi-Shiang Chan Y-CC, Yi-Hui Chen Y-Y T (2014) Role-balance based multi-secret images sharing using Boolean operations. KSII Trans Internet Inf Syst 8(5):1785–1800

    Google Scholar 

  111. Wang Z-H, Pizzolatti MS, Chang C-C (2014) Efficient and meaningful multi-secret image sharing based on block imitation. JIHMSP 5(1):55–69

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oinam Bidyapati Chanu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chanu, O.B., Neelima, A. A survey paper on secret image sharing schemes. Int J Multimed Info Retr 8, 195–215 (2019). https://doi.org/10.1007/s13735-018-0161-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13735-018-0161-3

Keywords