In certain application cases, it is a risk if a set of secret data is held by only one person without extra copies because the secret data set may be lost incidentally or modified intentionally...(or) it might be necessary for a group of persons to share a certain set of secret data. (Lin)

Click one of the following links to download a demo of homomorphic image encryption using Shamir's Secret Sharing.

Summary

For homomorphic image encryption, the user can either choose two images from their personal storage or two sample images from the provided directory, named "images", included in the ZIP file. Shares are created from these images on which a user-chosen homomorphic encryption method is used (addition or subtraction). The results from these share operations are then used to reconstruct the secret image, which is either the sum of the pixels from the image inputs or their difference. Users can view the images in larger formats by navigating through the provided directories.