<?xml version="1.0" encoding="UTF-8"?>
		<www.jsetms.com>
		<Title>A NOVEL SECRET IMAGE SHARING MODEL FOR SECURE MULTIMEDIA COMMUNICATION</Title>
		<Author>Shakera Fatima, Dr. Lalitha Saroja</Author>
		<Volume>02</Volume>
		<Issue>09</Issue>
		<Abstract>Because network technology and internet applications are developing so quickly protecting digital data from unauthorized access and alteration has become a critical challenge Many secret image sharing SIS techniques have been created in response to this difficulty SIS is a technique for preventing unwanted access to and change of private digital photographs The secret image is divided into numerous arbitrary shares each of which is intended to keep any information from being revealed to the intruders We provide a thorough analysis of SIS schemes and their benefits and drawbacks in this study We examine several verified secret image sharing VSIS systems that are currently in use and resistant to various forms of cheating We also talk about Shamir secret sharing which splits a secret into several pieces with a threshold number of components needed to reconstruct the secret and steganography techniques which conceal secret information within digital images Steganography and Shamir secret sharing are two of the many elements of creating safe and effective SIS schemes that we have uncovered Furthermore this survey investigation includes a comparison and contrast of multiple SIS approaches depending on different features We also mention a few SISbased applications Lastly we outline unresolved issues and potential paths forward in the SIS sector</Abstract>
		<permissions>
<copyright-statement>Copyright (c) Journal of Science Engineering Technology and Management Science. All rights reserved</copyright-statement>
<copyright-year>2026</copyright-year>
</permissions>
		</www.jsetms.com>
		