Research Article

Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography

Table 1

Literature review.

S. NoAuthor/yearObjectiveMethodologyLimitation

(1)Hsu et al./2007To focus on circular visual cryptography in order to perform multiple secrets hidingMultiple secrets and cryptographyThere is lack of technical work
(2)Feng et al./2008To implement visual secret sharing in order to perform multiple secretsMultiple secretsNeed to improve the scalability
(3)Wang/2011To implement random grid visual cryptography using identifiable sharesVisual cryptographyLimited scope
(4)Hsu et al./2012To focus on visual cryptographyVisual cryptographyNeed to improve the efficiency of system
(5)Lee and Chiu/2013Considering image size invariant visual cryptography in area of general access structures subject to display quality constraintsVisual cryptographyNo work is done in direction of security
(6)Askari et al./2014To implement novel visual cryptography schemes. Here work is done without pixel expansion for halftone imageVisual cryptographyResearch is not worked on accuracy
(7)Petrauskiene et al./2014To propose dynamic visual cryptography in order to perform an optical assessmentVisual cryptographyScope of this research is very less
(8)Shankar and Eswaran/2016To implement a secret image-sharing scheme in the area of visual cryptographyImage-sharing and visual cryptographyNeed to enhance accuracy and performance
(9)Punithavathi and Geetha/2016Implementing cancellable biometric template security by making use of segment-dependent visual cryptographyVisual cryptography and securityLack of accuracy
(10)Chaturvedi and Bhat/2015To improve the segment-based visual cryptographySegment and visual cryptographyThere is lack of performance
(11)Chao and Fan/2017Execution of random grid-based progressive visual secret-sharing scheme by making use of adaptive prioritySegment and visual cryptographyLack of technical work
(12)Chao and Fan/2017To produce random grid-based visual secret sharing by making use of multilevel encodingMultilevel encodingPerformance of this research is very low