Abstract
Cryptography is the process by which a readable message is converted into cipher-text unintelligible to an eavesdropper. With the advent of the internet, improved network infrastructures, and modern applications, electronic-based systems came into existence. Subsequently, the need for security of the personalized information was discerned. The purpose of the use of cryptography is to provide security, confidentiality, authenticity, and integrity of the data exchanged. Many cryptographic techniques which include the symmetric key and asymmetric key-based encryption techniques are generally employed for the above-mentioned purposes. However, it is seen that in cryptographic solutions key management is an important issue. In this review, we discuss the secret-sharing based cryptographic techniques that are inherently different from the conventional cryptographic systems. Since images constitute a large proportion of the multimedia transmitted, the concept of secret sharing is being applied to images as well. In this review, Image Secret Sharing techniques have been discussed in detail. Secret sharing or secret splitting is a method by which a secret is divided among a set of participants. Each participant receives a part or share of the secret. During the secret recovery phase, a subset of a predefined number of participants can collaborate and reveal the secret information. This work attempts to categorize and classify various available secret sharing schemes, to gather all the state-of-the-art knowledge on a single platform for research.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.