Analysis of Feature Enhancements in Visual Secret Sharing

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Visual Secret Sharing (VSS) aims at sharing of secrecy among many shadows depending on the number of dealers. These encrypted shadows themselves cannot reveal secrecy. A group of a pre-qualified number of shadows is sufficient to obtain the secret image. The quality of this secret is usually approximate to the original confidential image. This technique has evolved, offering solutions to the demands of the matured Internet domain. This paper analyzes the feature advancements in the VSS field. The VSS approaches remain distinct from the conventional cryptography, thereby offering new security solutions in many applications. Security being the central and challenging demand in contemporary information systems, the analysis of the state-of-the-art VSS stands significant.

Original languageEnglish
Title of host publicationProceedings of the 2020 IEEE International Conference on Communication and Signal Processing, ICCSP 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages828-832
Number of pages5
ISBN (Electronic)9781728149882
DOIs
Publication statusPublished - 07-2020
Event9th IEEE International Conference on Communication and Signal Processing, ICCSP 2020 - Melmaruvathur, India
Duration: 28-07-202030-07-2020

Publication series

NameProceedings of the 2020 IEEE International Conference on Communication and Signal Processing, ICCSP 2020

Conference

Conference9th IEEE International Conference on Communication and Signal Processing, ICCSP 2020
Country/TerritoryIndia
CityMelmaruvathur
Period28-07-2030-07-20

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Signal Processing
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Analysis of Feature Enhancements in Visual Secret Sharing'. Together they form a unique fingerprint.

Cite this