z-logo
open-access-imgOpen Access
Digital Image Secure Share Creation Techniques Analysis: A Survey
Author(s) -
C. Devi Parameswari,
K. Shankar
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a1114.1291s419
Subject(s) - image sharing , computer science , secret sharing , chinese remainder theorem , image (mathematics) , computer security , secure multi party computation , homomorphic secret sharing , world wide web , cryptography , artificial intelligence , algorithm
Security is a significant concern in data innovation that managing the web world today. In sharing based technique shares are created, encoded and stored into digital form. This paper discussed the various papers in secret share creation for image security like visual secret share creation, Chinese remainder theorem, Shamir secret sharing and so on. In this design, a secret image is programmed into n shadows of the random model. It is possible to interpret the secret image externally by overlay a certified subset of shadows. These shares are uncovering the secret image to assume to be imprinted on transparencies and in the wake of stacking them to one another. Here more than fifteen papers are analyzed; those papers are gathered from IEEE, Springer, Elsevier and some other Journals. In addition, security measures are analyzed for all image secret sharing procedure.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here