Abstract

Secret image sharing encrypts the secret image into n shadow images. The original secret image can be disclosed in case of k or more shadows are obtained; in contrast, when gathering no more than k shadow images, failed to restore secret, where k ≤ n. Since the shadow image will be maliciously tampered with or processed in practical application, researchers began to study robust secret image sharing schemes. At present, there is no overview of robust secret image sharing. This paper gives an extensive overview of this field to help new researchers quickly understand robust secret image sharing and identify research problems. First, this paper highly summarizes the robust secret image sharing schemes that have emerged in recent years and introduces the robust secret image sharing into two categories: one is the robust secret image sharing scheme resist to fake shadows, and the other is the robust secret image sharing scheme resist to image processing. Then, this paper compares the characteristics, performance indicators, advantages, and disadvantages of each type of scheme. Besides, this paper gives the definitions of robust secret image sharing schemes for these two types. Finally, we discuss these problems to be solved and the future research direction.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call