Secret Image Sharing Using Shamir Secret Rule

Authors

  • G. Lakshmi Prasanna B-tech, Department of CSE,Vignana Bharathi Institute of Technology Ghatkesar, Telangana, India.
  • A. Hema B-tech, Department of CSE,Vignana Bharathi Institute of Technology Ghatkesar, Telangana, India.
  • V. Sai Gowtham B-tech, Department of CSE,Vignana Bharathi Institute of Technology Ghatkesar, Telangana, India.
  • M. Vignesh B-tech, Department of CSE,Vignana Bharathi Institute of Technology Ghatkesar, Telangana, India.
  • Kamjula Lakshmi Kanth Reddy Assistant Professor, Department of CSE,Vignana Bharathi Institute of Technology Ghatkesar, Telangana, India

DOI:

https://doi.org/10.63856/ijis/v2i4/00035

Keywords:

Secret Image Sharing (SIS), Steganography, Shamir’s Secret Sharing, Image Security, Cryptography, Data Privacy, Secure Image Transmission, Information Hiding.

Abstract

Protection of digitalized information from unauthorized use and modification has emerged as an issue of paramount significance in the wake of quick advances in network technology and internet Applications. Give this issue a number of secret image sharing (SIS) schemes have been designed. SIS is a method for protecting sensitive digital images from unauthorized access and alteration.We have identified various aspects of developing secure and efficient SIS schemes, including steganography and Shamir secret sharing. Apart from that, comparison and constrat of various SIS methods on several properties are presented in survey. We also highlight some of the applications based on SIS. Finally, we present open challenges and future directions in the field of SIS.

References

1. S. Dey, “SD-EI: A cryptographic technique to encrypt images,” in Proc. Int. Conf. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 28–32.

2. Q.-A. Kester, L. Nana, A. C. Pascu, S. Gire, J. M. Eghan, and N. N. Quaynor, “A cryptographic technique for security of medical images in health information systems,” Procedia Computer Science, vol. 58, pp. 538–543, Jan. 2015.

3. M. Mundher, D. Muhamad, A. Rehman, T. Saba, and F. Kausar, “Digital watermarking for images security using discrete slantlet transform,” Applied Mathematics & Information Sciences, vol. 8, no. 6, pp. 2823–2830, Nov. 2014.

4. Mohanarathinam, “Digital watermarking techniques for image security: A review,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 8, pp. 3221–3229, 2020.

5. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.

6. M. Idakwo, M. Muazu, E. Adedokun, and B. Sadiq, “An extensive survey of digital image steganography: State of the art,” ATBU Journal of Science, Technology and Education, vol. 8, no. 2, pp. 40–54, 2020.

7. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.

8. R. Blakley, “Safeguarding cryptographic keys,” in Proc. National Computer Conference, 1979, pp. 313–317.

Downloads

Published

2026-04-22

Issue

Section

Articles

How to Cite

Secret Image Sharing Using Shamir Secret Rule. (2026). International Journal of Integrative Studies (IJIS), 2(4), 59-62. https://doi.org/10.63856/ijis/v2i4/00035

Similar Articles

61-70 of 74

You may also start an advanced similarity search for this article.