Open Access Open Access  Restricted Access Subscription Access

A Review on Secure Image Sharing Using Diverse Media Using MATLAB

Kartik Ingole

Abstract


The guideline point of this endeavor is to share an image in an association to avoid a transmission peril issue. Visual Secret Sharing Schemes cover a Secret picture in shares that appear upheaval like picture or calm picture. VSS plans experience the evil impacts of a transmission peril issue while sharing contains Secret Images since it will caution uncertainty and addition catch danger during transmission of the offers. To address this issue, we proposed a trademark picture based VSS plan (NVSS plot) that shares secret pictures through various carrier media to get the secret and the individuals during the transmission stage. The trademark offers can be photos or hold hand painted pictures in cutting edge structure or in printed structure. The uproar like offer is exhibited reliant upon these trademark offers and the baffling picture. The proposed approach offers a wonderful response for handling the transmission risk issue for the VSS plans. The unaltered typical offers are unique and safe, thus tremendously diminishing the transmission peril issue. We moreover propose possible ways to deal with shroud the uproar like proposal to decrease the transmission peril issue for the offer.


Full Text:

PDF

References


Naor, M., & Shamir, A. (1995). Visual cryptography. Advances in Cryptology, New York, NY, USA: Springer-Verlag, 950, 1–12.

Wang, R. Z., Lan, Y. C., Lee, Y. K., Huang, S. Y., Shyu, S. J., & Chia, T. L. (2010). Incrementing visual cryptography using random grids. Optics Communications, 283(21), 4242-4249.

Chiu, P. L., & Lee, K. H. (2011). A simulated annealing algorithm for general threshold visual cryptography schemes. IEEE transactions on information forensics and security, 6(3), 992-1001.

Lee, K. H., & Chiu, P. L. (2013). Image size invariant visual cryptography for general access structures subject to display quality constraints. IEEE transactions on image processing, 22(10), 3830-3841.

Ateniese, G., Blundo, C., De Santis, A., & Stinson, D. R. (2001). Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2), 143-161.


Refbacks

  • There are currently no refbacks.