An investigation on image secret sharing

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Numerous multimedia applications and communications are rapidly growing through the Internet. Because most of these multimedia communications are confidential and cannot be known by unauthorized users, secret image sharing has become a key technology for digital images in secured storage and confidential transmission. The ultimate objectives of secret sharing include transparency, authority (resistance to various image tampering and forgery methods), and high capacity of the hidden data. A variety of secret image sharing algorithms and techniques have been proposed in order to satisfy these objectives. These goals were used in this paper to compare current methods of image secret sharing and present their properties and limitations. This paper provided a state-of-the-art review and analysis of different existing secret image sharing methods along with some common standards and guidelines drawn from the literature.

Cite

CITATION STYLE

APA

Salehi, S., & Balafar, M. A. (2015). An investigation on image secret sharing. International Journal of Security and Its Applications, 9(3), 163–190. https://doi.org/10.14257/ijsia.2015.9.3.16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free