An Investigation on Image Secret Sharing

Saman Salehi, Mohammad Ali Balafar
2015 International Journal of Security and Its Applications  
Numerous multimedia applications and communications are rapidly growing through the Internet. Because most of these multimedia communications are confidential and cannot be known by unauthorized users, secret image sharing has become a key technology for digital images in secured storage and confidential transmission. The ultimate objectives of secret sharing include transparency, authority (resistance to various image tampering and forgery methods), and high capacity of the hidden data. A
more » ... ty of secret image sharing algorithms and techniques have been proposed in order to satisfy these objectives. These goals were used in this paper to compare current methods of image secret sharing and present their properties and limitations. This paper provided a state-of-the-art review and analysis of different existing secret image sharing methods along with some common standards and guidelines drawn from the literature. Secret sharing can be used in many real-live applications. For example, imagine a company with a secure information and common account balance. To access this account balance or secure information, mutual agreements of all the participants are needed. Another example is bank safe. Secret sharing can be used for accessing t he bank safe. The secret password can be shared among several images. Then, these shares are given ton participants ((k; n) scheme) and MMS (Multimedia Message Service) application service is implemented for retrieving secret password and accessing to the bank safe. The rest of this paper contains four sections. In Section 2, visual secret sharing scheme (VSS) is described. In Section 3, secret sharing scheme in the spatial do-main is considered. In Section 4, secret sharing is considered in frequency domain. Section 5 is devoted to the analysis and recommendations.
doi:10.14257/ijsia.2015.9.3.16 fatcat:hteex5xgtbf7boxes3jjvdeeva