Loading

Digital Image Secure Share Creation Techniques Analysis: A Survey
C. Devi Parameswari1, K. Shankar2
1C. Devi Parameswari, Department of Computer Applications, Kalasalingam Academy of Research and Education College, Krishnankoil (Tamil Nadu), India.
2K. Shankar, Department of Computer Applications, Alagappa University, Karaikudi (Tamil Nadu), India.
Manuscript received on 24 November 2019 | Revised Manuscript received on 18 December 2019 | Manuscript Published on 30 December 2019 | PP: 510-513 | Volume-9 Issue-1S4 December 2019 | Retrieval Number: A11141291S419/19©BEIESP | DOI: 10.35940/ijeat.A1114.1291S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security is a significant concern in data innovation that managing the web world today. In sharing based technique shares are created, encoded and stored into digital form. This paper discussed the various papers in secret share creation for image security like visual secret share creation, Chinese remainder theorem, Shamir secret sharing and so on. In this design, a secret image is programmed into n shadows of the random model. It is possible to interpret the secret image externally by overlay a certified subset of shadows. These shares are uncovering the secret image to assume to be imprinted on transparencies and in the wake of stacking them to one another. Here more than fifteen papers are analyzed; those papers are gathered from IEEE, Springer, Elsevier and some other Journals. In addition, security measures are analyzed for all image secret sharing procedure.
Keywords: Image Security, Share Creation, Visual and Cryptography.
Scope of the Article: Image Security