CFP last date
20 January 2025
Reseach Article

Survey Paper on Digital Image Sharing by Diverse Image Media

by Ashwini Udmale, S.B. Nimbekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 4
Year of Publication: 2016
Authors: Ashwini Udmale, S.B. Nimbekar
10.5120/ijca2016908688

Ashwini Udmale, S.B. Nimbekar . Survey Paper on Digital Image Sharing by Diverse Image Media. International Journal of Computer Applications. 137, 4 ( March 2016), 21-24. DOI=10.5120/ijca2016908688

@article{ 10.5120/ijca2016908688,
author = { Ashwini Udmale, S.B. Nimbekar },
title = { Survey Paper on Digital Image Sharing by Diverse Image Media },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 4 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number4/24264-2016908688/ },
doi = { 10.5120/ijca2016908688 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:27.717083+05:30
%A Ashwini Udmale
%A S.B. Nimbekar
%T Survey Paper on Digital Image Sharing by Diverse Image Media
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 4
%P 21-24
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Conventional cryptography is a method of transforming message into an unreadable format called as cipher text. This cipher text can easily be shared over the network without fear but anyone can get message easily by applying key on cipher text. Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme. However main drawback of VSS scheme is that it is experience from high transmission risk due to the shares are like noise. As the shares are like noise which in turn lead to cause the attackers attention. To solve this problem mechanism is developed called Natural image based visual secret sharing (NVSS). This paper is motivated by need of novel mechanism to transfer the secret images over network. In proposed work for regeneration of secret image a generated noisy share, natural images and seed (needed for random functions used) are required at the receiving end. Though generated share is noisy and its contents are not recognizable, overall structure may be visible in some cases. So data hiding is should be performed on generated share to hide that structure (texture) in noisy share.

References
  1. Kai-Hui Lee and Pei-Ling Chiu,"Digital Image Sharing by Diverse Image Media", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
  2. P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011.
  3. K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013.
  4. Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.
  5. I. Kang, G. R. Arce, and H. K. Lee, “Color extended visual cryptography using error diffusion,” IEEE Trans. Image Process., vol. 20, no. 1, pp. 132–145, Jan. 2011.
  6. T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, “A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images,” Digit. Signal Process., vol. 21, no. 6, pp. 734–745, Dec. 2011.
  7. D. S. Tsai, G. Horng, T. H. Chen, and Y. T. Huang, “A novel secret image sharing scheme for true-color images with size constraint,” Inf. Sci., vol. 179, no. 19, pp. 3247–3254, Sep. 2009.
  8. X. Wu, D. Ou, Q. Liang, and W. Sun, “A user-friendly secret image sharing scheme with reversible steganography based on cellular automata,” J. Syst. Softw., vol. 85, no. 8, pp. 1852–1863, Aug. 2012.
  9. C. Guo, C. C. Chang, and C. Qin, “A multi-threshold secret image sharing scheme based on MSP,” Pattern Recognit. Lett., vol. 33, no. 12, pp. 1594–1600, Sep. 2012.
  10. P. L. Chiu, K. H. Lee, K. W. Peng, and S. Y. Cheng, “A new color image sharing scheme with natural shadows,” in Proc. 10th WCICA, Beijing, China, Jul. 2012, pp. 4568–4573.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Secret Sharing Scheme: Natural image Encryption Steganography.