TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal


Privacy Protection Using Visual Secret Sharing Scheme: Review


Jasvant Kumar
Department of Computer Science and Engineering, Faculty of Engineering and Technology, University of Lucknow, Lucknow, India

Author

Chandrajeet Yadav
Department of Computer Science and Engineering, Faculty of Engineering and Technology, Dr Shakuntla Misra National Rehabilitation University, Lucknow, India

Author

Hanuman Maurya
Department of Computer Science and Engineering Institute of f Engineering and Technology, Lucknow, India

Author


📌 DOI: https://doi.org/10.63920/ICFCSAI2025.009

🔑 Keywords: Privacy protection, security, image security, visual secret sharing, visual cryptography.

📅 Publication Date: 02 January 2026

📜 License:

  • Share — Copy and Redistribute the material
  • Adapt — Remix, Transform, and build upon the material
  • The licensor cannot revoke these freedoms as long as you follow the license terms.

Abstract:

In the digital age, safeguarding sensitive visual data is a critical challenge due to its widespread use and the severe implications of unauthorized access. Visual Secret Sharing (VSS) schemes offer a robust solution by dividing a secret image into multiple, seemingly random shares that reveal no information individually. Only when a predefined number of shares are combined can the original image be reconstructed, ensuring privacy without reliance on complex computational decryption. Introduced by Naor and Shamir, VSS has evolved to support diverse applications, including secure document sharing, biometric authentication, and digital watermarking. This paper explores the principles, advancements, and practical implementations of VSS, highlighting its strengths—such as human-centric decryption and high security—and addressing limitations like pixel expansion and contrast loss. By examining its role in privacy protection across sectors like healthcare, finance, and e-voting, we demonstrate VSS’s potential as a versatile tool for securing visual data in an interconnected world, while identifying future directions for enhancing its efficiency and scalability.

Download Full PDF Paper


📖 How to Cite

Jasvant Kumar, Chandrajeet Yadav, and Hanuman Maurya (2026). Privacy Protection Using Visual Secret Sharing Scheme: Review. TEJAS J. Technol. Humanit. Sci.,, Vol. 05, Issue 01. https://doi.org/10.63920/ICFCSAI2025.009

📊 Article Metrics

👁️ Views: 12
📥 Downloads: 8

References

[1] Naor, M., & Shamir, A. (1994). Visual Cryptography. EUROCRYPT '94, Springer, pp. 1-12. DOI: 10.1007/BFb0053414.
[2] Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612 613. https://doi.org/10.1145/359168.359176
[3] Liu, Zuquan, et al. "A novel (t, s, k, n)-threshold visual secret sharing scheme based on access structure partition." ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16.4 (2020): 1-21.
[4] Kannojia, Suresh Prasad, and Jasvant Kumar. "XOR-based visual secret sharing scheme using pixel vectorization." Multimedia Tools and Applications 80.10 (2021): 14609-14635.
[5] Yang, Ching-Nung, and Chi-Sung Laih. "New colored visual secret sharing schemes." Designs, Codes and cryptography 20.3 (2000): 325-336.
[6] Hou, Young-Chang, et al. "Block-based progressive visual secret sharing." Information Sciences 233 (2013): 290-304.
[7] Yan, Xuehu, and Yuliang Lu. "Progressive visual secret sharing for general access structure with multiple decryptions." Multimedia Tools and Applications 77.2 (2018): 2653-2672.
[8] Kannojia, Suresh Prasad, and Jasvant Kumar. "Plane-Wise Encryption Based Progressive Visual Cryptography for Gray Image." International Conference on Communication, Networks and Computing. Singapore: Springer Singapore, 2018.
[9] Kannojia, Suresh Prasad, and Jasvant Kumar. "XOR-based unexpanded meaningful visual secret sharing scheme." International Journal of Security and Networks 14.1 (2019): 1-9.
[10] Yang, Ching-Nung, and Tse-Shih Chen. "Extended visual secret sharing schemes: improving the shadow image quality." International Journal of Pattern Recognition and Artificial Intelligence 21.05 (2007): 879-898.
[11] Yuan, Jiangtao, and Lixiang Li. "A fully dynamic secret sharing scheme." Information Sciences 496 (2019): 42-52.
[12] Li, Fulin, et al. "A verifiable (k, n)-threshold dynamic quantum secret sharing scheme." Quantum Information Processing 21.7 (2022).
[13] Hou, Y. C. (2003). Visual Cryptography for Color Images. Pattern Recognition, 36(7), 1619-1629. DOI: 10.1016/S0031-3203(02)00249-2.
[14] Ateniese, G., Blundo, C., De Santis, A., & Stinson, D. R. (2001). Extended Capabilities for Visual Cryptography. Theoretical Computer Science, 250(1-2), 143-161. DOI: 10.1016/S0304 3975(00)00238-8.
[15] Ateniese, Giuseppe, et al. "Visual cryptography for general access structures." Information and computation 129.2 (1996): 86-106.
[16] Hou, Y. C. (2003). Visual Cryptography for Color Images. Pattern Recognition, 36(7), 1619-1629. DOI: 10.1016/S0031-3203(02)00249-2.
[17] Chiu, P. Y., & Hsueh, S. Y. (2009). A Visual Cryptography Scheme for Color Images Using Halftone Technology. IEEE Transactions on Image Processing, 16(1), 36-45. DOI: 10.1109/TIP.2006.884928. [18] Shyu, S. J. (2007). Image Encryption by Random Grids. Pattern Recognition, 40(3), 1014-1031. DOI: 10.1016/j.patcog.2006.07.014.
[19] Yang, Ching-Nung, and Tse-Shih Chen. "Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion." Pattern Recognition Letters 26.2 (2005): 193-206.