Visual secret sharing and related Works -A Review
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illega...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Anbar
2023-06-01
|
Series: | مجلة جامعة الانبار للعلوم الصرفة |
Subjects: | |
Online Access: | https://juaps.uoanbar.edu.iq/article_178907_c3a9ab2cdd9c7503f34ecd0922be1a42.pdf |
_version_ | 1797373110107766784 |
---|---|
author | Nahidah Darweesh Ali Sagheer |
author_facet | Nahidah Darweesh Ali Sagheer |
author_sort | Nahidah Darweesh |
collection | DOAJ |
description | The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team. This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology. |
first_indexed | 2024-03-08T18:45:39Z |
format | Article |
id | doaj.art-0cde2f1e953144849892868c8bccbce8 |
institution | Directory Open Access Journal |
issn | 1991-8941 2706-6703 |
language | English |
last_indexed | 2024-03-08T18:45:39Z |
publishDate | 2023-06-01 |
publisher | University of Anbar |
record_format | Article |
series | مجلة جامعة الانبار للعلوم الصرفة |
spelling | doaj.art-0cde2f1e953144849892868c8bccbce82023-12-28T22:02:30ZengUniversity of Anbarمجلة جامعة الانبار للعلوم الصرفة1991-89412706-67032023-06-0117116918710.37652/juaps.2023.178907178907Visual secret sharing and related Works -A ReviewNahidah Darweesh0Ali Sagheer1University of Anbar College of Computer Science and Information Technology Department of Computer ScienceUniversity of Anbar College of Computer Science and Information Technology Department of Computer ScienceThe accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team. This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology.https://juaps.uoanbar.edu.iq/article_178907_c3a9ab2cdd9c7503f34ecd0922be1a42.pdfvisual secret sharingsingle secretmulti-secret sharingverifiablexor operation |
spellingShingle | Nahidah Darweesh Ali Sagheer Visual secret sharing and related Works -A Review مجلة جامعة الانبار للعلوم الصرفة visual secret sharing single secret multi-secret sharing verifiable xor operation |
title | Visual secret sharing and related Works -A Review |
title_full | Visual secret sharing and related Works -A Review |
title_fullStr | Visual secret sharing and related Works -A Review |
title_full_unstemmed | Visual secret sharing and related Works -A Review |
title_short | Visual secret sharing and related Works -A Review |
title_sort | visual secret sharing and related works a review |
topic | visual secret sharing single secret multi-secret sharing verifiable xor operation |
url | https://juaps.uoanbar.edu.iq/article_178907_c3a9ab2cdd9c7503f34ecd0922be1a42.pdf |
work_keys_str_mv | AT nahidahdarweesh visualsecretsharingandrelatedworksareview AT alisagheer visualsecretsharingandrelatedworksareview |