Visual secret sharing and related Works -A Review

The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illega...

Full description

Bibliographic Details
Main Authors: Nahidah Darweesh, Ali Sagheer
Format: Article
Language:English
Published: University of Anbar 2023-06-01
Series:مجلة جامعة الانبار للعلوم الصرفة
Subjects:
Online Access:https://juaps.uoanbar.edu.iq/article_178907_c3a9ab2cdd9c7503f34ecd0922be1a42.pdf
_version_ 1797373110107766784
author Nahidah Darweesh
Ali Sagheer
author_facet Nahidah Darweesh
Ali Sagheer
author_sort Nahidah Darweesh
collection DOAJ
description The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team.  This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology.
first_indexed 2024-03-08T18:45:39Z
format Article
id doaj.art-0cde2f1e953144849892868c8bccbce8
institution Directory Open Access Journal
issn 1991-8941
2706-6703
language English
last_indexed 2024-03-08T18:45:39Z
publishDate 2023-06-01
publisher University of Anbar
record_format Article
series مجلة جامعة الانبار للعلوم الصرفة
spelling doaj.art-0cde2f1e953144849892868c8bccbce82023-12-28T22:02:30ZengUniversity of Anbarمجلة جامعة الانبار للعلوم الصرفة1991-89412706-67032023-06-0117116918710.37652/juaps.2023.178907178907Visual secret sharing and related Works -A ReviewNahidah Darweesh0Ali Sagheer1University of Anbar College of Computer Science and Information Technology Department of Computer ScienceUniversity of Anbar College of Computer Science and Information Technology Department of Computer ScienceThe accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team.  This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology.https://juaps.uoanbar.edu.iq/article_178907_c3a9ab2cdd9c7503f34ecd0922be1a42.pdfvisual secret sharingsingle secretmulti-secret sharingverifiablexor operation
spellingShingle Nahidah Darweesh
Ali Sagheer
Visual secret sharing and related Works -A Review
مجلة جامعة الانبار للعلوم الصرفة
visual secret sharing
single secret
multi-secret sharing
verifiable
xor operation
title Visual secret sharing and related Works -A Review
title_full Visual secret sharing and related Works -A Review
title_fullStr Visual secret sharing and related Works -A Review
title_full_unstemmed Visual secret sharing and related Works -A Review
title_short Visual secret sharing and related Works -A Review
title_sort visual secret sharing and related works a review
topic visual secret sharing
single secret
multi-secret sharing
verifiable
xor operation
url https://juaps.uoanbar.edu.iq/article_178907_c3a9ab2cdd9c7503f34ecd0922be1a42.pdf
work_keys_str_mv AT nahidahdarweesh visualsecretsharingandrelatedworksareview
AT alisagheer visualsecretsharingandrelatedworksareview