This document discusses secure image secret sharing schemes based on steganography. It provides background on secret sharing, visual cryptography, and steganography techniques like least significant bit insertion, adaptive MELSBR method, and bit plane complexity segmentation. The document analyzes how combining secret sharing and steganography can make secret sharing schemes more secure by embedding shares in cover images, making them less obvious to attackers. It reviews few existing methods that combine secret sharing and information hiding and identifies limitations like low reliability, large shadow size, and constraints on secret image size. The intent of the paper is to explain how secret sharing combined with steganography improves security and to guide selection of a scheme for different needs.