|
S. No | Author/year | Objective | Methodology | Limitation |
|
(1) | Hsu et al./2007 | To focus on circular visual cryptography in order to perform multiple secrets hiding | Multiple secrets and cryptography | There is lack of technical work |
(2) | Feng et al./2008 | To implement visual secret sharing in order to perform multiple secrets | Multiple secrets | Need to improve the scalability |
(3) | Wang/2011 | To implement random grid visual cryptography using identifiable shares | Visual cryptography | Limited scope |
(4) | Hsu et al./2012 | To focus on visual cryptography | Visual cryptography | Need to improve the efficiency of system |
(5) | Lee and Chiu/2013 | Considering image size invariant visual cryptography in area of general access structures subject to display quality constraints | Visual cryptography | No work is done in direction of security |
(6) | Askari et al./2014 | To implement novel visual cryptography schemes. Here work is done without pixel expansion for halftone image | Visual cryptography | Research is not worked on accuracy |
(7) | Petrauskiene et al./2014 | To propose dynamic visual cryptography in order to perform an optical assessment | Visual cryptography | Scope of this research is very less |
(8) | Shankar and Eswaran/2016 | To implement a secret image-sharing scheme in the area of visual cryptography | Image-sharing and visual cryptography | Need to enhance accuracy and performance |
(9) | Punithavathi and Geetha/2016 | Implementing cancellable biometric template security by making use of segment-dependent visual cryptography | Visual cryptography and security | Lack of accuracy |
(10) | Chaturvedi and Bhat/2015 | To improve the segment-based visual cryptography | Segment and visual cryptography | There is lack of performance |
(11) | Chao and Fan/2017 | Execution of random grid-based progressive visual secret-sharing scheme by making use of adaptive priority | Segment and visual cryptography | Lack of technical work |
(12) | Chao and Fan/2017 | To produce random grid-based visual secret sharing by making use of multilevel encoding | Multilevel encoding | Performance of this research is very low |
|