Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Visual Secret Sharing Scheme

V. Maria Antoniate Martin, Dr. K. David, P. Mesiya


The formatting requirements for Visual cryptographic technique is used for secure communication, various secrets and multimedia information are transmitted over the internet and suitable techniques are required to prevent form the illegal usage of information. This paper provides the survey of various visual cryptographic schemes based on their performance. This paper focuses on various threshold schemes like N, (2, N),(3,N), (K,K) and (K,N). In order to improve the security issue over the communication channel meaningful shares are used. The visual cryptography for binary pictures is also discussed. Other performance measures such as pixel expansion, contrast, accuracy is discussed in this paper.


Cryptography, Visual Cryptography, Visual Secret Sharing, Pixel Expansion, Contrast and Encoding.

Full Text:



Sai-zhi Ye, Guo-xiang Yao, Quan-long Guan, “A multiple secret sharing scheme with general access structure, International Symposium on Intelligent Ubiquitous Computing and Education, 2009 IEEE

Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li, “A (2, 3) Threshold Secret Sharing Scheme Using Sudoku”, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE 2010.

Sonali Patil, Prashant Deshmukh ”An Explication of Multifarious Secret Sharing Schemes”International Journal of Computer Applications (0975 – 8887) Volume 46– No.19, May 2012.

X. Wu and W. Sun “Visual secret sharing for general access structures by random grids”IEEE , Dec2012.

Sonali Patil, Kapil Tajane, Janhavi Sirdeshpande “General Access Structure For Modulo-2 Secret Sharing Scheme” International Journal of Engineering Research & Technology(2278-0181) Volume 1.

Young-Chang Hou, Visual Cryptography for Color Images, Pattern Recognition 36 (2003) 1619 – 1629.

Jose J Tharayil, E.S.Karthik Kumar, Neena Susan Alex, Visual Cryptography Using Hybrid Halftoning, Procedia Engineering 38 ( 2012 ) 2117 – 2123.

Sandeep Katta, “Recrsive Information Hiding in visual cryptography”, International Journal of Computer Science and Communication, Vol. 3, No. 5, pp. 297-299, 2010.

Lekhika chettri,” Visual cryptography scheme based on pixel expansion for black and white image”, International Journal of Computer Science and Information Technology, Vol. 5, No. 3, pp. 4190-4193, 2014.

Srinivasalu, K.Ramanajaneyulu, ”Visual cryptography scheme using Halftone technique”, International Journal of Electronics and Communication Technology, Vol. 3, No. 4, pp. 90-93, 2012.

Jerripothula Sandeep, Abdul Manjeed, “Embedded Extended Visual Cryptography scheme”, Journal of Computer Engineering, Vol. 8, No. 1, pp. 41-47, 2012.

Maneesh kumar, Sourav Mukhopadhyay, “Visual cryptography for black and white image”, International Journal of Information and Computation Technology, Vol. 3, No. 11, pp. 1149-1154, 2013.

Nakajima, M. and Yamaguchi, Y., Extended visual cryptography for natural images. Journal of WSCG. v10 i2. 303-310.

E. D. Karnin, J. W. Greene, and M. E. Hellman, “On secret sharing systems,” vol. IT-29, no. 1, pp. 35–41, Jan. 1983.

D. R. Stinson, “Cryptography: Theory and Practice”, CRC Press, Boca Raton 1995.

Menezes, A., P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, pp. 524-528. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.