Considering that different techniques of hiding images are known for a  long time, but have not found wider application, perhaps because of  their shortcomings. In this publication are described some types of techniques secret sharing images that are already in use. The author aims to review these techniques and  summarizes their features.


image coding; image reconstruction; data privacy; authentication

Ahuja B.S., Frooq O., Kaur S., Singhal R., Digital watermarking of ECG data for secure wireless communication, International Conference on Recent Trends in Information. Telecommunication and Computing, IEEE Computer Society, 2010.

Ansair N., Ni Z., Lin X., Shi Y. Q., Su W., Sun Q., Robust lossless image data hiding designed for semi-fragile image authentication, IEEE Transactions on Circuits and Systems for Video Technology 18(4)/2008,497–509.

Ateniese G., Blundo C., De Santis A., Stinson D. R., Visual cryptography for general access structures, Information and Computation 129(2)/1996, 86–106.

Banerjee A., Gupta S. K. S., Venkatasubramanian K. K., PSKA: Usable and secure key agreement scheme for Body Area Network, IEEE Transactions on Information Technology in Biomedicine 14(1)/2010.

Blakley G. R., Safeguarding cryptographic keys, Proceedings of AFIPS National Computer Conference 48/1979, 313–317.

Blundo C., Naor, M., De Santis A., Visual cryptography for grey level images, Information Processing Letters 75/2000, 255–259.

Blundo C., De Santis A., Stinson D. R., On the Contrast in Visual Cryptography Schemes, Journal of Cryptology 12/1999, 261–289.

De Bonis A., De Santis A., Randomnees in visual cryptography, Theoretical Computer Science 314(3)/2004, 351–374.

Chang C. C., Chan C. S., Lin P. Y., Secret Image Sharing with Reversible Steganography, 2009 International Conference on Computational Intelligence and Natural Computing, IEEE 2009.

Chang C.C, Chen T.S., Tsai C. S., Sharing multiple secrets in digital images , Journal of Systems and SoftwareCIP99 64(2)/2002, 163–170.

Chang C. C., Wu H. C., Sharing visual multi-secrets using circle shares, Computer Standards & Interfaces 28(1)/2005, 123–135.

Chen T. S., Yang C. N., An image secret sharing scheme with the capability of previewing the secret image, IEEE 2007.

Chen T. S., Yang C. N., Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation, Patter Recognition 39(7)/2006, 1300–1314.

Chen L. H., Wu C. C., A study on visual cryptography. Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998.

Cox I. J., Bloom J. A., Miller M. L., Digital Watermarking, Morgan Kaufmann Publishers Inc., San Francisco, CA, 2001.

Cimato S., De Prisco R., De Santis A., Colored visual cryptography without color darkening, Theoretical Computer Science 374(1–3)/2007, 261–276.

Cimato S., Prisco R., Santis A., Probabilistic visual cryptography schemes, The computer Journal 49/2006, 97–107.

Eisen P. A., Stinson D. R., Threshold visual cryptography schemes with specified whiteness, Designs, Codes and Cryptography 25(1)/2002, 15–61.

Fang W.P., Friendly progressive visual secret sharing, Pattern Recognition 41(4)/2008, 1410–1414.

Giakoumaki A., Koutsouris D., Pavlopoulos S., Secure and efficient health data management through multiple watermarking on medical images, Med. Bio. Eng. Comput. 44/2006, 619–631.

Hofmeister T., Krause M., Simon, H., Contrast-Optimal k out of n Secret Sharing Schemes in Visual Cryptography, In Proceedings of the Third Annual international Conference on Computing and Combinatorics 1276/1997, 176–185.

Hou Y.C., Visual cryptography for color images, Pattern Recognition 36/2003, 1619–1629.

Huang S. Y., Lee Y. K., Shyu S. J., Wang R.Z., Sharing multiple secrets in visual cryptography, Pattern Recognition 40(12)/2007, 3633–3657.

Hsueh N. L., Lin C. C., A lossless data hiding scheme based on three-pixel block differences, Pattern Recognition 41(4)/2008, 1415–1425.

Ibaida A., Khalil I., van Schyndel R., A low complexity high capacity ECG signal watermark for wearable sensor-net health monitoring system, Computing in Cardiology 38/2011, 393–396.

Katzenbeisser S., Petitcolas F.A.P., Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Inc., Boston, 2000.

Laih C. S., Yang C. N., New colored visual secret sharing schemes, Designs, Codes and Cryptography 20(3)/2000, 325–335.

Li P., Ma P., Su X., Image secret sharing and hiding with authentication, 2010 First International Conference on Pervasive Computing, Signal Processing and Applications, IEEE 2010.

Lin C. C., Tsai W. H., Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters 2003, 349–358.

Lin J. C., Thien C. C., Secret image sharing, Computers & Graphics, 26/2002, 765–770.

Nabiyev V. V., Ulutas G., Ulutas M., Yazici R., (2, 2)-Secret Sharing Scheme with Improved Share Randomnes, IEEE 2008.

Noar M., Shamir A., Visual cryptography, Advances in Cryptology: Eurocrypt’94, Spring-Verlag, Berlin 1995,1–12.

Rodriguez J. J., Thodi D. M., Expansion embedding techniques for reversible watermarking, IEEE Transactions on Image Processing 16(3)/2007, 721–730.

Shamir A., How to share a secret, Communications of the ACM 22(11)/1979, 612–613.

Shyu S. J., Efficient visual secret sharing scheme for color images, Patter Recognition 39(5)/2006, 866–880.

Stinson D. R., An introduction to visual cryptography, Public Key Solutions’97, Canada, April 11997.

Su C. H., Wang R. Z., Secret image sharing with smaller shadow images, Pattern Recognition Letters 27(6)/2006, 551–555.

Van Tilborg H. C. A., Verheul E. R., Constructions and Properties of k out of n Visual Secret Sharing Schemes, Designs, Codes and Cryptography 11(2)/1997, 179–196.

Published : 2016-12-22

Świerkosz, A. (2016). CHARACTERISTIC OF SELECTED IMAGE HIDING TECHNIQUES. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 6(4), 43-48.

Agnieszka Świerkosz
AGH w Krakowie, Katedra Automatyki i Inżynierii Biomedycznej  Poland