Secret Image Sharing Using Shamir Secret Rule
DOI:
https://doi.org/10.63856/ijis/v2i4/00035Keywords:
Secret Image Sharing (SIS), Steganography, Shamir’s Secret Sharing, Image Security, Cryptography, Data Privacy, Secure Image Transmission, Information Hiding.Abstract
Protection of digitalized information from unauthorized use and modification has emerged as an issue of paramount significance in the wake of quick advances in network technology and internet Applications. Give this issue a number of secret image sharing (SIS) schemes have been designed. SIS is a method for protecting sensitive digital images from unauthorized access and alteration.We have identified various aspects of developing secure and efficient SIS schemes, including steganography and Shamir secret sharing. Apart from that, comparison and constrat of various SIS methods on several properties are presented in survey. We also highlight some of the applications based on SIS. Finally, we present open challenges and future directions in the field of SIS.
References
1. S. Dey, “SD-EI: A cryptographic technique to encrypt images,” in Proc. Int. Conf. Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 28–32.
2. Q.-A. Kester, L. Nana, A. C. Pascu, S. Gire, J. M. Eghan, and N. N. Quaynor, “A cryptographic technique for security of medical images in health information systems,” Procedia Computer Science, vol. 58, pp. 538–543, Jan. 2015.
3. M. Mundher, D. Muhamad, A. Rehman, T. Saba, and F. Kausar, “Digital watermarking for images security using discrete slantlet transform,” Applied Mathematics & Information Sciences, vol. 8, no. 6, pp. 2823–2830, Nov. 2014.
4. Mohanarathinam, “Digital watermarking techniques for image security: A review,” Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 8, pp. 3221–3229, 2020.
5. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.
6. M. Idakwo, M. Muazu, E. Adedokun, and B. Sadiq, “An extensive survey of digital image steganography: State of the art,” ATBU Journal of Science, Technology and Education, vol. 8, no. 2, pp. 40–54, 2020.
7. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
8. R. Blakley, “Safeguarding cryptographic keys,” in Proc. National Computer Conference, 1979, pp. 313–317.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Integrative Studies (IJIS)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.



