<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "http://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article article-type="review-article" dtd-version="1.3" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PJS</journal-id>
<journal-id journal-id-type="publisher-id">Premier Journal of Science</journal-id>
<journal-id journal-id-type="pmc">PJS</journal-id>
<journal-title-group>
<journal-title>PJ Science</journal-title>
</journal-title-group>
<issn pub-type="epub">3049-9011</issn>
<publisher>
<publisher-name>Premier Science</publisher-name>
<publisher-loc>London, UK</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.70389/PJS.100156</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>REVIEW</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Social sciences</subject><subj-group><subject>Linguistics</subject><subj-group><subject>Grammar</subject><subj-group><subject>Phonology</subject><subj-group><subject>Syllables</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Engineering and technology</subject><subj-group><subject>Signal processing</subject><subj-group><subject>Speech signal processing</subject></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Medicine and health sciences</subject><subj-group><subject>Mental health and psychiatry</subject><subj-group><subject>Schizophrenia</subject></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Cell biology</subject><subj-group><subject>Cellular types</subject><subj-group><subject>Animal cells</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cellular neuroscience</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
<subj-group subj-group-type="Discipline-v3"><subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
</article-categories>
<title-group>
<article-title>A Narrative Study on Visual Cryptography Techniques for Robust and Secure Image Communication: A Review</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0009-0001-5825-7912</contrib-id>
<name>
<surname>S</surname>
<given-names>Shibani Raju</given-names>
</name>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>A</surname>
<given-names>John Blesswin</given-names>
<suffix>Dr.</suffix>
</name>
<role content-type="http://credit.niso.org/contributor-roles/conceptualization">Conceptualization</role>
<role content-type="http://credit.niso.org/contributor-roles/writing-original-draft">Writing &#x2013; original draft</role>
<role content-type="http://credit.niso.org/contributor-roles/review-editing">Review and editing</role>
</contrib>
<aff id="aff1"><institution-wrap><institution-id institution-id-type="ror">https://ror.org/050113w36</institution-id><institution>Research Scholar, Computing Technologies, SRM Institute of Science and Technology, Kattankulathur</institution></institution-wrap>, <city>Chengalpattu</city>, <state>Tamil Nadu</state>, <country>India</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor001"><bold>Correspondence to:</bold> Shibani Raju S, <email>sr2396@srmist.edu.in</email></corresp>
<fn fn-type="other"><p>Peer Review</p></fn>
</author-notes>
<pub-date pub-type="epub">
<day>24</day>
<month>12</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<month>12</month>
<year>2025</year>
</pub-date>
<volume>15</volume>
<issue>1</issue>
<elocation-id>100156</elocation-id>
<history>
<date date-type="received">
<day>14</day>
<month>08</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>08</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>08</day>
<month>10</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>Shibani Raju S and John Blesswin A</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
<license-p>This is an open access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">Creative Commons Attribution License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="info:doi/10.70389/PJS.100156"/>
<abstract>
<p>Visual cryptography is a powerful method for securely sharing and protecting visual data by splitting an image into multiple shares. Individual shares do not reveal any information, but when combined, they allow for the reconstruction of the original image. The survey categorizes different approaches based on pixel expansion, complexity, and the quality of the reconstructed image. It focuses specifically on color image encryption, an emerging field of interest because of its use in secure communication, digital media, and medical imaging. The paper provides a comprehensive review of recent advances in color visual cryptography, discussing the latest techniques and challenges in the field. his paper is a systematic review of color visual cryptography techniques. The contribution is threefold: (i) categorizing schemes by pixel expansion, complexity, and reconstruction quality, (ii) critically analyzing limitations and trade-offs, and (iii) identifying open research gaps and future directions.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Color visual cryptography</kwd>
<kwd>Share generation schemes</kwd>
<kwd>Pixel expansion optimization</kwd>
<kwd>Color image secret sharing</kwd>
<kwd>Reconstructed image quality metrics</kwd>
</kwd-group>
<counts>
<fig-count count="3"/>
<table-count count="2"/>
<page-count count="8"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>Version accepted</meta-name>
<meta-value>3</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec>
<title><ext-link ext-link-type="uri" xlink:href="https://premierscience.com/wp-content/uploads/2025/15/pjs-25-1197.pdf">Source-File: pjs-25-1197.pdf</ext-link></title>
</sec>
<sec id="sec001" sec-type="intro">
<title>Introduction</title>
<p>Image communication is the act of exchanging images among applications and systems. Image communication can be represented by integrity, confidentiality, and authentication. In the contemporary digital world, image communication has been a highly effective tool for communicating complex ideas quickly. Visual information, such as images, infographics, and diagrams, acts as a universal language that helps people from different backgrounds understand messages easily without relying on text. It also facilitates real-time comprehension, and so it is an essential tool for applications across education to marketing. Image communication is important as it facilitates quick and transparent communication of advanced information, transcending linguistic boundaries, and augmenting comprehension. Visual Cryptography (VC) is a method that divides a secret image into several shares or transparencies, where each share individually contains no information about the original image. The entire image can be reconstructed only by combining the shares. For encryption, the original image is divided into several shares. For example, when an image is divided into two shares, each pixel from the original image is split into two corresponding pixels in the shares. One pixel in each share is randomly assigned, while the other is calculated so that the original pixel becomes visible when the shares are layered together. For decryption, to view the original image, the shares are stacked or overlaid. The visual information from each share combines to reveal the original image. This process ensures secure image transmission, maintaining confidentiality and preventing unauthorized access during communication.</p>
</sec>
<sec id="sec002">
<title>Review Methodology</title>
<p>This systematic review adheres to established guidelines to guarantee thorough coverage of visual cryptography research. A systematic search was performed across various academic databases, including IEEE Xplore, ACM Digital Library, Springer, and Google Scholar, utilizing key terms such as &#x201C;visual cryptography,&#x201D; &#x201C;color image encryption,&#x201D; &#x201C;secret sharing schemes,&#x201D; and &#x201C;visual secret sharing.&#x201D; The review included literature from 2000 to 2024 to document the progression of techniques from foundational studies to modern developments. The inclusion criteria emphasized peer-reviewed articles, conference proceedings, and book chapters that specifically addressed methods of color visual cryptography, while excluding non-English publications, abstract-only papers, and studies restricted to binary or grayscale images. The initial search produced around 150 papers, which were systematically screened for relevance based on titles and abstracts, followed by a full-text evaluation for final selection. The screening process yielded 30 high-quality papers that fulfilled all inclusion criteria and exhibited substantial contributions to the field of color visual cryptography research. The data extraction emphasized methodology, performance metrics, pixel expansion factors, computational complexity, and reconstructed image quality to facilitate a thorough comparative analysis of various approaches.</p>
</sec>
<sec id="sec003">
<title>Basic of Visual Cryptography</title>
<p>VC is a cryptographic method used to secure images by splitting them into multiple shares. At its simplest level, which is referred to as VC (2,2) , an image is split into two shares.<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> A pixel from the original image is split into two sub-pixels, and each is distributed randomly to the two shares. On their own, these shares look like random patterns and reveal nothing about the original image. However, when the two shares are stacked, the original image is reconstructed and becomes visible. This method is particularly useful for secure image sharing and authentication, where the original image can exclusively be revealed by the intended recipient possessing all necessary shares. The strength of VC lies in its simplicity, as it doesn&#x2019;t require complex algorithms to decrypt the image, only the proper stacking of shares. Additionally, the method offers strong resistance against brute-force and statistical attacks, ensuring human-perceptible visual recovery without the need for computational decryption or cryptographickeys. Moreover, modern VC approaches integrate visual quality enhancement and pixel optimization techniques to improve the clarity and contrast of the reconstructed image.</p>
<p><xref ref-type="fig" rid="F1">Figure 1</xref> illustrates a simple VC scheme used to securely share a secret image between two participants. The Naor and Shamir Scheme,<sup><xref ref-type="bibr" rid="ref31">31</xref></sup> introduced in 1994, is one of the earliest and most influential techniques in Visual Cryptography, enabling secure image sharing by dividing a secret image into multiple shares, each appearing as random noise when viewed individually. Only when these shares are overlaid does the original image become visible, without requiring any complex computation or decryption algorithm. In this scheme, every pixel of the secret image&#x2014;either black or white&#x2014;is divided into two sub-pixels distributed across two separate shares, referred to as Share 1 and Share 2. For a white pixel, Share 1 contains one white and one black sub-pixel, while Share 2 contains the reverse pattern, whereas for a black pixel, both shares carry the same sub-pixel arrangement, either black&#x2013;white or white&#x2013;black, depending on the encoding pattern used. When the two shares are superimposed, the human visual system perceives the reconstructed image: white pixels appear lighter or grayish due to alternating sub-pixels, while black pixels appear completely dark. This ensures that neither of the individual shares reveals any information about the original secret, thereby maintaining complete confidentiality until both shares are combined. Furthermore, this method is classified as a (2,2) Visual Cryptography Scheme, indicating that both shares are required for decryption, and the reconstruction process relies entirely on human visual perception rather than computational processing. This approach provides a high level of security since no partial information can be extracted from a single share; however, it introduces the limitation of pixel expansion, where each pixel of the original image is represented by multiple sub-pixels in the shares, leading to an increase in image size. Despite this drawback, the Naor and Shamir scheme remains a foundational technique in the field of Visual Cryptography, serving as the basis for advanced methods such as Color Visual Cryptography, Progressive VC, and Meaningful Share Generation. In practical applications, this scheme is widely utilized in secure image transmission, confidential document sharing, and biometric authentication systems, where data privacy and visual integrity are of critical importance. Additionally, recent studies have optimized this scheme by reducing pixel expansion and improving image contrast for better visual quality. It also forms the basis for hybrid models that integrate computational cryptography with VC to enhance security levels.</p>
<fig id="F1" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100156.g001</object-id>
<label>Fig 1</label>
<caption><title>Pixel representation of Naor and shamir scheme</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/15/pjs-25-1197-Figure-1.webp?">Figure 1</ext-link></p>
</fig>
<p><xref ref-type="fig" rid="F2">Figure 2</xref> shows the VC process applied to a binary image containing text. The process starts with the original binary image, where the text is easily readable in black on a white background. This image is split into two distinct shares, referred to as &#x201C;Share 1&#x201D; and &#x201C;Share 2.&#x201D; Both shares are random noise, and contain no apparent pattern or information that can be seen by the naked eye. This randomness guarantees that each share separately cannot disclose the content of the original image. But, when the two shares are overlap or added together, the original text is reconstructed in the &#x201C;Reconstructed Image&#x201D; portion. The reconstructed image appears slightly blurred, with some areas looking less sharp or mixed in gray shades as a result of the overlap of black and white sub-pixels from the two shares. This method safely conceals the data, since only when both the shares are used together can they be disclosed, proving the utility of VC to secure sensitive visual information.</p>
<fig id="F2" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100156.g002</object-id>
<label>Fig 2</label>
<caption><title>Pixel representation of Naor and shamir scheme</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/15/pjs-25-1197-Figure-2.webp?">Figure 2</ext-link></p>
</fig>
</sec>
<sec id="sec004">
<title>Types of Visual Cryptography</title>
<p>Before Types of VC, it is important to understand the various methods and schemes developed to encode visual information into multiple shares that can only be decoded when the appropriate shares are combined. These types differ in terms of how they handle images, the number of shares required for reconstruction, the complexity of the encryption, and the quality of the reconstructed image. Each type is designed to balance security, visual quality, and computational efficiency based on application needs. Additionally, some schemes focus on reducing pixel expansion to minimize storage and transmission overhead, while others aim to support color images, grayscale images, or even meaningful shares that reveal partial information without compromising the full secret.</p>
<p><xref ref-type="fig" rid="F3">Figure 3</xref> illustrates the different types of VC schemes based on the nature of the secret image representation. VC techniques are broadly categorized into three types Binary, Grayscale, and Color depending on the pixel characteristics and visual information used during encryption and decryption.</p>
<fig id="F3" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100156.g003</object-id>
<label>Fig 3</label>
<caption><title>Classification of visual cryptography techniques</title></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/15/pjs-25-1197-Figure-3.webp?">Figure 3</ext-link></p>
</fig>
<sec id="sec004-1">
<title>Binary Image Cryptography</title>
<p>A binary image is composed of pixels that can take on only two possible colors, typically black and white. These images are usually presented in black and white, where the two pixel values are commonly represented as 0 for black and either 1 or 255 for white.</p>
</sec>
<sec id="sec004-2">
<title>Grayscale Image Cryptography</title>
<p>A Grayscale image only contains luminance information and no color information. The contrast extends from Black to white in its strongest intensity.</p>
</sec>
<sec id="sec004-3">
<title>Color Image Cryptography</title>
<p>A Color image is used to characterize the colors interns of intensity values. In the case of classical color images, this domain is then brought down to three channels, each corresponding to the primary color: red, green and blue.</p>
</sec>
</sec>
<sec id="sec005">
<title>Review of Visual Cryptography: Methodologies, Outcomes, and Research Trends</title>
<p>This section provides a detailed analysis of various VC techniques, based on a review of 30 research papers. The analysis is structured into two key tables: one focuses on Methodology and Outcomes, and the other on Research Characteristics.</p>
<sec id="sec005-1">
<title>Methodology and outcomes in color visual cryptography</title>
<p>Methodology and Outcomes examines four critical parameters: pixel expansion, computational complexity, methodology, and the reconstructed image&#x2019;s quality. These factors are essential for assessing the effectiveness and efficiency of different VC techniques</p>
<p><xref ref-type="table" rid="T1">Table I</xref> reviews the different VC techniques with respect to four key parameters: pixel expansion, complexity, methodology, and reconstructed image quality.</p>
<table-wrap id="T1">
<label>Table 1</label>
<caption><title>Analysis of COLOR visual cryptography techniques</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Authors</th>
<th valign="top" align="center">Pixel Expansion</th>
<th valign="top" align="center">Complexity</th>
<th valign="top" align="left">Methodology</th>
<th valign="top" align="center">Reconstructed Image Quality</th>
<th valign="top" align="center">PSNR</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">[1]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A Thumbnail Preserving Encryption (TPE) scheme.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">28.4</td>
</tr>
<tr>
<td valign="top" align="left">[2]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Color Secret Sharing Protocol (CSSP)</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">34.7</td>
</tr>
<tr>
<td valign="top" align="left">[3]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Elzaki transformation and substitution.</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">30.2</td>
</tr>
<tr>
<td valign="top" align="left">[4]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A four-dimensional (4D) hyperchaotic Chen map and a hybrid DNA coding</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">31.5</td>
</tr>
<tr>
<td valign="top" align="left">[5]</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Shamir scheme with the Cipher Block Chaining (CBC) mode of operation.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">35.9</td>
</tr>
<tr>
<td valign="top" align="left">[6]</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Harris Hawks Optimization (HHO) algorithm.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">26.8</td>
</tr>
<tr>
<td valign="top" align="left">[7]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">New approach based on an evolutionary framework.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">33.1</td>
</tr>
<tr>
<td valign="top" align="left">[8]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A cryptanalysis driven design approach is used.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">27.6</td>
</tr>
<tr>
<td valign="top" align="left">[9]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Jarvis halftoning is used.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">36.4</td>
</tr>
<tr>
<td valign="top" align="left">[10]</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Encrypted by four shares cyan, magenta, yellow, mask</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">29.3</td>
</tr>
<tr>
<td valign="top" align="left">[11]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Arnold transform and pixel vectorization.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">34.1</td>
</tr>
<tr>
<td valign="top" align="left">[12]</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Four different encoding modes (numeric, alphanumeric, kanji, binary).</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">35.0</td>
</tr>
<tr>
<td valign="top" align="left">[13]</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Hybrid VC algorithm.</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">30.7</td>
</tr>
<tr>
<td valign="top" align="left">[14]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Rivest Shamir Adleman (RSA) algorithm and the Gaussian pyramid (GP)</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">27.2</td>
</tr>
<tr>
<td valign="top" align="left">[15]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Hybrid substitution cryptographic methods with Vigenere &#x0026; Beaufort method</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">34.6</td>
</tr>
<tr>
<td valign="top" align="left">[16]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Blowfish algorithmic rule</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">32.8</td>
</tr>
<tr>
<td valign="top" align="left">[17]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Image feature protection techniques to conventional image retrieval techniques.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">25.9</td>
</tr>
<tr>
<td valign="top" align="left">[18]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Adaptive halftoning technique</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">33.4</td>
</tr>
<tr>
<td valign="top" align="left">[19]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Halftone Visual Cryptography (HVC) construction method.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">35.6</td>
</tr>
<tr>
<td valign="top" align="left">[20]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Normal cryptographic techniques.</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">30.1</td>
</tr>
<tr>
<td valign="top" align="left">[21]</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Embedded Extended VC using Artificial Bee Colony (ABC).</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">29.8</td>
</tr>
<tr>
<td valign="top" align="left">[22]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A New dual watermarking.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">34.9</td>
</tr>
<tr>
<td valign="top" align="left">[23]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A new color VC scheme.</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">36.0</td>
</tr>
<tr>
<td valign="top" align="left">[24]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A two-tier protection mechanism for Dual Modular Redundancy (DMR).</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">33.5</td>
</tr>
<tr>
<td valign="top" align="left">[25]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Images are halftoned and encrypted using a binary key image through an XOR</td>
<td valign="top" align="center">High</td>
<td valign="top" align="center">34.3</td>
</tr>
<tr>
<td valign="top" align="left">[26]</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Visual information pixel (VIP) synchronization and error diffusion.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">26.5</td>
</tr>
<tr>
<td valign="top" align="left">[27]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Halftoning technique and error diffusion techniques.</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">29.6</td>
</tr>
<tr>
<td valign="top" align="left">[28]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">A shared key algorithm that in the Joint Photographic Experts Group (JPEG) domain.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">25.7</td>
</tr>
<tr>
<td valign="top" align="left">[29]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Canonical schemes.</td>
<td valign="top" align="center">Low</td>
<td valign="top" align="center">27.9</td>
</tr>
<tr>
<td valign="top" align="left">[30]</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">High</td>
<td valign="top" align="left">Simple algorithms on two camouflage.</td>
<td valign="top" align="center">Medium</td>
<td valign="top" align="center">30.9</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Pixel Expansion refers to the increase in the number of pixels after the encryption process, which can affect the efficiency and applicability of the encryption algorithm. Pixel expansion values in this table are normally low (1) or medium (2), with one having a high expansion (3). Low pixel growth typically signifies a more efficient system that does not increase image size much, whereas higher values can signify more detailed or complicated encryption. High pixel expansion can affect storage and transmission needs, so it is important to strike a balance between security requirements and resource limitations.</p>
<p>Complexity assesses how computationally intensive the encryption process. All the methods listed in the table are marked as high in complexity, which suggests that they require significant computational resources. This high complexity is often associated with advanced encryption algorithms or the integration of multiple cryptographic techniques.</p>
<p>Methodology refers to the specific cryptographic or transformation techniques used in the encryption process. The table lists a diverse range of methodologies, from simple substitution and permutation schemes to more complex approaches involving hyperchaotic maps, DNA coding, and adaptive halftoning. For example, Yongming Zhang<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> utilize a transformation and permutation encryption scheme, while Wassim Alexan<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> employ a four-dimensional hyperchaotic Chen map combined with DNA coding, demonstrating the wide variety of approaches taken to enhance security.</p>
<p>   Reconstructed Image Quality indicates the visual quality of the image after decryption. High-quality reconstructed images are crucial in applications like medical imaging, where clarity and accuracy are essential. The table shows a mix of high, medium and low image qualities, with high quality results being more desirable but often requiring more sophisticated or complex methodologies. The reconstructed image quality in VC refers to how accurately the original secret image is revealed when the shares are combined. This quality can vary based on the specific VC scheme used, the pixel expansion factor, and how the shares are generated and overlaid. The quality is typically categorized into three levels: Low, Medium, and High.</p>
<p>In low-quality reconstruction, the secret image is visible when the shares are combined, but the clarity and sharpness are significantly reduced. The image may appear blurry, pixelated, or have substantial noise, making fine details hard to discern. In medium-quality reconstruction, the secret image is reasonably clear but may still lack some fine details and sharpness. The image is recognizable, but minor artifacts or noise might be present. In high-quality reconstruction, the secret image is revealed with great clarity and sharpness. The image closely resembles the original, with minimal loss of detail and little to no noise. For instance, Suresh Sankaranarayanan.<sup><xref ref-type="bibr" rid="ref2">2</xref></sup> CSSP achieves high reconstructed image quality, whereas Yongming Zhang.<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> TPE scheme results in low image quality.</p>
</sec>
<sec id="sec005-2">
<title>Advances in secure visual cryptography</title>
<p>The various approaches discussed in these works focus on enhancing security and quality in VC and image encryption, particularly in the transmission and storage of medical and digital images. Techniques such as semantic preservation and complete cross-plane protection<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> and chaotic systems in an evolutionary framework<sup><xref ref-type="bibr" rid="ref7">7</xref></sup> are integrated with cryptographic methods like Shamir&#x2019;s secret sharing, Advanced Encryption Standard (AES) encryption,<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> and Deoxyribonucleic acid (DNA) coding<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> to achieve higher security. The use of hybrid methods, such as combining Vigenere and Beaufort encryption<sup><xref ref-type="bibr" rid="ref15">15</xref></sup> further improves image quality and robustness against attacks. Advanced algorithms like the ABC<sup><xref ref-type="bibr" rid="ref21">21</xref></sup> and HHO<sup><xref ref-type="bibr" rid="ref6">6</xref></sup> also contribute to reducing complexity and avoiding pixel expansion. These methods address limitations such as color distortion and pixel expansion, ensuring lossless recovery. The focus on preserving image quality while enhancing security, especially through innovative techniques like shared key encryption in the JPEG domain<sup><xref ref-type="bibr" rid="ref28">28</xref></sup> and robust watermarking,<sup><xref ref-type="bibr" rid="ref21">21</xref></sup> illustrates the continuous evolution in the field of VC and image encryption.</p>
</sec>
<sec id="sec005-3">
<title>Critical analysis of current limitations</title>
<p>A trade-off is evident across visual cryptography techniques: methods with low pixel expansion, such as,<sup><xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref></sup> improve efficiency but often compromise on security, whereas higher expansion schemes like<sup><xref ref-type="bibr" rid="ref21">21</xref></sup> strengthen protection at the cost of storage overhead. Performance gaps also remain, as high-quality reconstruction methods<sup><xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref9">9</xref></sup> typically rely on meaningful shares, making them more vulnerable to visual attacks compared to random-share approaches. Despite nearly all schemes reporting &#x201C;high complexity,&#x201D; standardized computational time comparisons are absent, limiting clarity on real-world deployment. Moreover, no existing method achieves the ideal combination of pixel expansion = 1 with consistently high reconstruction quality, leaving this as an open research challenge. Finally, share generation strategies impact practicality: multi-share approaches<sup><xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref9">9</xref></sup> pose storage and transmission issues for mobile or IoT contexts, while single-share models,<sup><xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref16">16</xref></sup> fall short of security requirements in sensitive applications.</p>
</sec>
<sec id="sec005-4">
<title>Challenges in Visual Cryptography Complexity</title>
<p>The system&#x2019;s complexity and computational demands create significant obstacles to its scalability and efficiency, particularly with larger images or complex datasets. Despite a modest improvement in the quality of reconstructed images, the associated increase in computational costs outweighs the benefits. Consequently, the system is not well-suited for real-time or resource-constrained environments. The intricate processes involved, including halftoning and error diffusion, further limit its practicality. Moreover, the high memory requirements and processing overhead make it challenging to integrate with lightweight devices such as IoT sensors and edge computing nodes. Optimizing the algorithm for parallel processing could help mitigate some of these challenges (<xref ref-type="table" rid="T2">Table 2</xref>).</p>
<table-wrap id="T2">
<label>Table 2</label>
<caption><title>Characteristics of COLOR visual cryptography techniques</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Authors</th>
<th valign="top" align="center">Year</th>
<th valign="top" align="left">Type of Shares Generated</th>
<th valign="top" align="left">Type of Secret Image</th>
<th valign="top" align="center">No. of Secret Images</th>
<th valign="top" align="center">No. of Share Image</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">[1]</td>
<td valign="top" align="center">2024</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left">[2]</td>
<td valign="top" align="center">2024</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left">[3]</td>
<td valign="top" align="center">2024</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[4]</td>
<td valign="top" align="center">2023</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[5]</td>
<td valign="top" align="center">2023</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left">[6]</td>
<td valign="top" align="center">2023</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[7]</td>
<td valign="top" align="center">2023</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[8]</td>
<td valign="top" align="center">2023</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[9]</td>
<td valign="top" align="center">2023</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">4</td>
</tr>
<tr>
<td valign="top" align="left">[10]</td>
<td valign="top" align="center">2022</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">4</td>
</tr>
<tr>
<td valign="top" align="left">[11]</td>
<td valign="top" align="center">2022</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left">[12]</td>
<td valign="top" align="center">2022</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[13]</td>
<td valign="top" align="center">2021</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[14]</td>
<td valign="top" align="center">2021</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[15]</td>
<td valign="top" align="center">2020</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[16]</td>
<td valign="top" align="center">2019</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[17]</td>
<td valign="top" align="center">2018</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">4</td>
</tr>
<tr>
<td valign="top" align="left">[18]</td>
<td valign="top" align="center">2017</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[19]</td>
<td valign="top" align="center">2016</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[20]</td>
<td valign="top" align="center">2015</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[21]</td>
<td valign="top" align="center">2014</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[22]</td>
<td valign="top" align="center">2013</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[23]</td>
<td valign="top" align="center">2013</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">3</td>
</tr>
<tr>
<td valign="top" align="left">[24]</td>
<td valign="top" align="center">2012</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">[25]</td>
<td valign="top" align="center">2011</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[26]</td>
<td valign="top" align="center">2011</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[27]</td>
<td valign="top" align="center">2009</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[28]</td>
<td valign="top" align="center">2005</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[29]</td>
<td valign="top" align="center">2003</td>
<td valign="top" align="center">Random</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
<tr>
<td valign="top" align="left">[30]</td>
<td valign="top" align="center">2000</td>
<td valign="top" align="center">Meaningful</td>
<td valign="top" align="left">Color</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">2</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec005-5">
<title>Research characteristics:</title>
<p>The Research Characteristics table explores four parameters as well: the types of shares generated, the nature of the secret image, the number of secret images, and the number of share images. These aspects highlight the diverse approaches and configurations used in the field. Finally, the overall advancements and challenges in VC methods are discussed, providing insights into the current state and future directions of this research area. The table outlines the characteristics of various VC methods based on several key parameters: authorship, year of publication, type of shares generated, type of secret image, number of secret images, and the number of share images. Authorship and Year indicate who developed each technique and when it was published. This provides a timeline of advancements in VC from 2000 to 2024, showing how methods have evolved over time. For instance, early works by Chin-Chen Chang<sup><xref ref-type="bibr" rid="ref27">27</xref></sup> in 2000 and 2009 laid foundational concepts that later researchers, like Yongming Zhang<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> and Suresh<sup><xref ref-type="bibr" rid="ref2">2</xref></sup>, have built upon in 2024.</p>
<p>Type of Shares Generated is categorized into &#x201C;Meaningful&#x201D; and &#x201C;Random&#x201D; shares. Meaningful shares, also known as structured or visually significant shares, are designed to look like meaningful images, even when they are viewed individually. These shares are often used in scenarios where each share needs to be visually appealing or convey some information, even when the secret cannot be revealed without combining them. Each share has a meaningful appearance, such as a recognizable image or pattern, even when viewed on its own. When the shares are overlaid, they still reveal the secret image. This approach is often used in applications where the shares need to carry some visual significance or where random noise patterns are undesirable. The trade-off is typically a reduction in security compared to random shares, as the structure of the shares might provide some clues about the secret. In a meaningful share scheme, two images might be generated where one is a picture of a cat and the other is a picture of a dog. Neither image on its own reveals the secret, but when combined, they might reveal a hidden message or another image.</p>
<p>Random shares are composed of random pixel patterns. When you look at each share individually, they appear as random noise with no discernible information. This randomness ensures that no information about the secret is revealed until the shares are combined. Each share looks like a completely random pattern of black and white pixels. The individual shares are meaningless on their own. Only when the correct number of shares is overlaid or combined does the original secret image become visible. The security is very high because the random nature of the shares makes it impossible to guess the secret without all necessary shares. If you have a 2-out-of-2 VC scheme, two random-looking images (shares) are generated. Neither image reveals any information, but when they are overlaid, the original secret image is revealed. For example, methods by Yongming Zhang<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> and Bishoy Sharobim<sup><xref ref-type="bibr" rid="ref11">11</xref></sup> generate meaningful shares. On the other hand, random shares appear as noise until properly decrypted, which enhances security but can be less practical for certain uses, as seen in the work of Wassim Alexan<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> and many others. </p>
<p>Type of Secret Image indicates that all the methods listed focus on encrypting color images. This uniformity suggests a common challenge in the field maintaining the integrity and quality of color images during and after the encryption process, which is crucial for applications in areas like medical imaging, secure communications, and digital art.</p>
<p>Number of Secret Images refers to the quantity of original images being encrypted in each method. Most methods focus on encrypting a single secret image, which simplifies the process and is typical in many practical applications. However, some approaches, like those by Suresh Sankaranarayanan<sup><xref ref-type="bibr" rid="ref2">2</xref></sup> and Mohd Amaan Siddiqui<sup><xref ref-type="bibr" rid="ref13">13</xref></sup> deal with multiple secret images (up to six), indicating more complex encryption scenarios that can be beneficial in advanced security applications.</p>
<p>Number of Share Images corresponds to how many images are generated to represent the encrypted secret. The number of share images varies across methods, ranging from 1 to 4. Methods generating fewer shares, like those by Xinpeng Man<sup><xref ref-type="bibr" rid="ref7">7</xref></sup> and Hira Nazir<sup><xref ref-type="bibr" rid="ref8">8</xref></sup> tend to focus on simplifying the decryption process or reducing storage requirements, while methods generating more shares, like those by Somwanshi<sup><xref ref-type="bibr" rid="ref9">9</xref></sup> and Anli Sherine<sup><xref ref-type="bibr" rid="ref10">10</xref></sup> might be aiming for enhanced security or specific application requirements where multiple shares are beneficial.</p>
</sec>
</sec>
<sec id="sec006">
<title>Key Metrics for Evaluating Visual Share Quality</title>
<p>The visual quality of shares in VC is crucial for determining the effectiveness of the technique. This quality is quantitatively assessed using three key metrics: PSNR (Peak Signal-to-Noise Ratio), MSE (Mean Squared Error), and SSIM (Structural Similarity Index). PSNR and MSE evaluate the fidelity of the shares compared to the original images, while SSIM provides a measure of perceptual similarity, considering structural information and image degradation. These metrics collectively help in understanding how well the visual shares maintain the integrity and appearance of the original image.</p>
<sec id="sec006-1">
<title>Peak Signal-to-Noise Ratio</title>
<p>PSNR is a metric used to assess the quality of a reconstructed or compressed image compared to its original version. It measures how much noise (error) is introduced during compression. A higher PSNR value indicates that the reconstructed image is closer to the original, implying better quality. PSNR is expressed in decibels (dB), calculated using a logarithmic scale, making it more sensitive to small differences in high-quality images.</p>
<disp-formula id="DM1"><label>(1)</label><mml:math id="IDM1" display="block"><mml:mrow><mml:mi>P</mml:mi><mml:mi>S</mml:mi><mml:mi>N</mml:mi><mml:mi>R</mml:mi><mml:mtext>&#x2009;&#x2009;</mml:mtext><mml:mo>=</mml:mo><mml:mtext>&#x2009;&#x2009;</mml:mtext><mml:mn>10</mml:mn><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mi>A</mml:mi><mml:msup><mml:mi>X</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow><mml:mrow><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi></mml:mrow></mml:mfrac></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>In equation (1), where MAX is the maximum possible pixel value of the image (e.g., 255 for 8-bit images). MSE is the Mean Squared Error between the original and reconstructed images.<sup><xref ref-type="bibr" rid="ref4">4</xref></sup></p>
</sec>
<sec id="sec006-2">
<title>Mean Squared Error (MSE)</title>
<p>MSE measures the average of the squared differences between the original and reconstructed pixel values. A smaller MSE indicates a reduced error, which implies that the reconstructed image is nearer to the original. It calculates the error as the difference between corresponding pixels of the original and reconstructed images.</p>
<disp-formula id="DM2"><label>(2)</label><mml:math id="IDM2" display="block"><mml:mrow><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi><mml:mtext>&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mo>=</mml:mo><mml:mtext>&#x2009;&#x2009;</mml:mtext><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>M</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac><mml:mstyle displaystyle='true'><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>M</mml:mi></mml:munderover><mml:mrow><mml:mstyle displaystyle='true'><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mrow><mml:msup><mml:mrow><mml:mrow><mml:mo>[</mml:mo> <mml:mrow><mml:mi>I</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>K</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow> <mml:mo>]</mml:mo></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:mrow></mml:mstyle></mml:mrow></mml:mstyle></mml:mrow></mml:math></disp-formula>
<p>In equation (2), where M are the dimensions of the image. <italic>I (i, j)</italic> is the pixel value at position <italic>(i, j)</italic> in the original image. <italic>K (i, j)</italic> is the pixel value at position <italic>(i, j)</italic> in the reconstructed image.<sup><xref ref-type="bibr" rid="ref28">28</xref></sup></p>
</sec>
<sec id="sec006-3">
<title>Structural Similarity Index (SSIM)</title>
<p>SSIM estimates the similarity between two images with respect to luminance, contrast, and structure, reflecting perceived changes in structural information. SSIM ranges from &#x2013;1 to 1, where 1 indicates perfect similarity, indicates no correlation, and negative values indicate dissimilarity. It considers the interdependence of pixel values in the neighbourhood, unlike PSNR and MSE, which are pointwise measures.</p>
<disp-formula id="DM3"><label>(3)</label><mml:math id="IDM3" display="block"><mml:mrow><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>,</mml:mo><mml:mi>y</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mtext>&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mo>=</mml:mo><mml:mtext>&#x2009;&#x2009;&#x2009;</mml:mtext><mml:mfrac><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>x</mml:mi></mml:msub><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>y</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>x</mml:mi><mml:mi>y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>&#x03BC;</mml:mi><mml:mi>x</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>&#x03BC;</mml:mi><mml:mi>v</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mi>x</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mi>v</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>In Equation (3), Where <italic>&#x03BC;</italic><sub>x</sub> and <italic>&#x03BC;</italic><sub>y</sub> are the average intensities of images <italic>x</italic> and <italic>y</italic>. <inline-formula id="IM1"><mml:math id="IIM1" display="block"><mml:mrow><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mi>x</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:math></inline-formula> and <inline-formula id="IM2"><mml:math id="IIM2" display="block"><mml:mrow><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mi>y</mml:mi><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:math></inline-formula> are the variances of <italic>x</italic> and <italic>y</italic>. <italic>&#x03C3;</italic><sub>xy</sub> is the covariance of <italic>x</italic> and <italic>y</italic>. C<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> and C<sup><xref ref-type="bibr" rid="ref2">2</xref></sup> are constants to stabilize the division.<sup><xref ref-type="bibr" rid="ref23">23</xref></sup></p>
</sec>
</sec>
<sec id="sec007">
<title>Securing Color Images Through Advanced Encryption Methods</title>
<p>A significant number of these papers, especially from 2020 onwards, focus on the encryption and sharing of color images, reflecting a growing trend in enhancing security for more complex and visually rich data. The papers employ a wide range of methodologies, including hybrid substitution ciphers,<sup><xref ref-type="bibr" rid="ref15">15</xref></sup> chaotic systems,<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> genetic codes, Harris Hawks Optimization algorithms,<sup><xref ref-type="bibr" rid="ref6">6</xref></sup> and error diffusion techniques,<sup><xref ref-type="bibr" rid="ref26">26</xref></sup> indicating the variety of approaches being explored to improve the effectiveness and efficiency of color image encryption. Many studies center around VC, particularly for color images, which extend traditional black-and-white VC techniques. The use of color increases the complexity but also enhances applicability in real-world scenarios, especially within intelligent networked environments where secure visual data transmission is crucial.</p>
<p>A common theme is the emphasis on secret sharing schemes, where a secret image is divided into multiple shares that are required to be merged in order to create the original image. This method is important in secure transmission and storage of sensitive visual data, such as 5G-enabled IoT ecosystems and edge computing frameworks. With the increasing interconnectivity of devices, ensuring robust encryption and secure communication channels has become a priority. Several recent studies, such as those using chaotic systems and evolutionary frameworks, highlight the trend of integrating advanced mathematical models and optimization algorithms to improve security and unpredictability. The fusion of VC with machine learning and deep learning-based anomaly detection further strengthens security by enabling adaptive threat response mechanisms. Many studies evaluate their methodologies based on specific performance metrics such as pixel expansion, computational complexity, and the quality of the reconstructed image, indicating a strong focus on quantifiable improvements. Additionally, real-time encryption and decryption processes are being optimized for distributed networks, ensuring minimal latency while maintaining high security levels. Several papers explore practical applications of cryptographic schemes in securing medical images, cloud storage, and IoT devices&#x2014;domains where intelligent networks play a crucial role in data exchange and processing. There is a noticeable trend towards hybrid techniques, combining multiple cryptographic approaches like chaos theory with genetic algorithms or watermarking with VC to enhance security features and address the limitations of individual methods. The complexity of cryptographic schemes has been increasing, with recent studies integrating more sophisticated algorithms and frameworks, such as fractional-order hyperchaotic maps<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> and multi-level VC, to meet the evolving security challenges in distributed high-speed communication infrastructures.</p>
</sec>
<sec id="sec008" sec-type="conclusions">
<title>Conclusion</title>
<p>The paper presents a detailed overview of color VC, with focus on advancements, methodologies, and challenges in the field. It highlights the balance between security and image quality within different cryptographic schemes, particularly in color image encryption. The paper addresses the difficulties in these methods, such as pixel expansion and computational complexity, and investigates hybrid approaches that strive to find balance between security and efficiency. Future advancements are anticipated to further automate secure image sharing with high protection levels. The growing emphasis on improving the quality of reconstructed images while maintaining robust security measures is evident, indicating a significant trend in the development of VC methods for secure communication and data protection.</p>
</sec>
</body>
<back>
<fn-group>
<fn id="n1" fn-type="other">
<p>Additional material is published online only. To view please visit the journal online.</p>
<p><bold>Cite this as:</bold> Shibani Raju S and Blesswin J. A Narrative Study on Visual Cryptography Techniques for Robust and Secure Image Communication: A Review. Premier Journal of Science 2025;15:100156</p>
<p><bold>DOI:</bold> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.70389/PJS.100156">https://doi.org/10.70389/PJS.100156</ext-link></p>
</fn>
<fn id="n2" fn-type="other">
<p><bold>Ethical approval</bold></p>
<p>N/a</p>
</fn>
<fn id="n3" fn-type="other">
<p><bold>Consent</bold></p>
<p>N/a</p>
</fn>
<fn id="n4" fn-type="other">
<p><bold>Funding</bold></p>
<p>No industry funding</p>
</fn>
<fn id="n5" fn-type="conflict">
<p><bold>Conflicts of interest</bold></p>
<p>N/a</p>
</fn>
<fn id="n6" fn-type="other">
<p><bold>Author contribution</bold></p>
<p>Shibani Raju S and John Blesswin A &#x2013; Conceptualization, Writing &#x2013; original draf, review and editing</p>
</fn>
<fn id="n7" fn-type="other">
<p><bold>Guarantor</bold></p>
<p>Shibani Raju S</p>
</fn>
<fn id="n8" fn-type="other">
<p><bold>Provenance and peer-review</bold></p>
<p>Unsolicited and externally peer-reviewed</p>
</fn>
<fn id="n9" fn-type="other">
<p><bold>Data availability statement</bold></p>
<p>The authors confirm that the data supporting the findings of this study are available in the article</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="ref1"><label>1</label><mixed-citation publication-type="journal"><string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Lan</surname> <given-names>R</given-names></string-name>. <article-title>Visually semantics-aware color image encryption based on cross-plane substitution and permutation</article-title>. <source>IEEE Trans Ind Inform</source>. <year>2024</year>;<volume>20</volume>(<issue>8</issue>):<fpage>10576</fpage>&#x2013;<lpage>86</lpage>.</mixed-citation></ref>
<ref id="ref2"><label>2</label><mixed-citation publication-type="journal"><string-name><surname>Sankaranarayanan</surname> <given-names>S</given-names></string-name>, <etal>et al.</etal> <article-title>Enhancing healthcare imaging security: Color secret sharing protocol for the secure transmission of medical images</article-title>. <source>IEEE Access</source>. <year>2024</year>;<volume>12</volume>:<fpage>100200</fpage>&#x2013;<lpage>16</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ACCESS.2024.3426935">https://doi.org/10.1109/ACCESS.2024.3426935</ext-link>.</mixed-citation></ref>
<ref id="ref3"><label>3</label><mixed-citation publication-type="journal"><string-name><surname>Mardan</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shadman</surname> <given-names>R</given-names></string-name>, <string-name><surname>Al-rassam</surname> <given-names>O</given-names></string-name>. <article-title>Encryption of color images with a new framework</article-title>. <source>ARO-Sci J Koya Univ</source>. <year>2024</year>;<volume>12</volume>(<issue>1</issue>):<fpage>170</fpage>&#x2013;<lpage>80</lpage>.</mixed-citation></ref>
<ref id="ref4"><label>4</label><mixed-citation publication-type="journal"><string-name><surname>Alexan</surname> <given-names>W</given-names></string-name>, <string-name><surname>Gabr</surname> <given-names>M</given-names></string-name>, <string-name><surname>Mamdouh</surname> <given-names>E</given-names></string-name>, <string-name><surname>Elias</surname> <given-names>R</given-names></string-name>, <string-name><surname>Aboshousha</surname> <given-names>A</given-names></string-name>. <article-title>Color image cryptosystem based on sine chaotic map, 4D Chen hyperchaotic map of fractional-order and hybrid DNA coding</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>54928</fpage>&#x2013;<lpage>56</lpage>.</mixed-citation></ref>
<ref id="ref5"><label>5</label><mixed-citation publication-type="journal"><string-name><surname>Farran Mart&#x00ED;n</surname> <given-names>J</given-names></string-name>, <string-name><surname>Cerezo</surname> <given-names>D</given-names></string-name>. <article-title>A new color image secret sharing protocol unpublished</article-title>, <year>2023</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21203/rs.3.rs-3144967/v1">https://doi.org/10.21203/rs.3.rs-3144967/v1</ext-link></mixed-citation></ref>
<ref id="ref6"><label>6</label><mixed-citation publication-type="journal"><string-name><surname>Ibrahim</surname> <given-names>DR</given-names></string-name>, <string-name><surname>Sihwail</surname> <given-names>R</given-names></string-name>, <string-name><surname>Abuthawabeh</surname> <given-names>A</given-names></string-name>, <string-name><surname>Abduljabbar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Mizher</surname> <given-names>A</given-names></string-name>. <article-title>A novel color visual cryptography approach based on Harris hawks optimization algorithm</article-title>. <source>Symmetry</source>. <year>2023</year>;<volume>15</volume>(<issue>7</issue>):<fpage>1305</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/sym15071305">https://doi.org/10.3390/sym15071305</ext-link>.</mixed-citation></ref>
<ref id="ref7"><label>7</label><mixed-citation publication-type="journal"><string-name><surname>Song</surname> <given-names>Y</given-names></string-name>. <article-title>Encryption of color images with an evolutionary framework controlled by chaotic systems</article-title>. <source>Entropy</source>. <year>2023</year>;<volume>25</volume>(<issue>4</issue>):<fpage>631</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/e25040631">https://doi.org/10.3390/e25040631</ext-link>.</mixed-citation></ref>
<ref id="ref8"><label>8</label><mixed-citation publication-type="journal"><string-name><surname>Nazir</surname> <given-names>H</given-names></string-name>, <string-name><surname>Bajwa</surname> <given-names>IS</given-names></string-name>, <string-name><surname>Abdullah</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kazmi</surname> <given-names>R</given-names></string-name>, <string-name><surname>Samiullah</surname> <given-names>M</given-names></string-name>. <article-title>A color image encryption scheme combining hyperchaos and genetic codes</article-title>. <source>IEEE Access</source>. <year>2022</year>;<volume>10</volume>:<fpage>14480</fpage>&#x2013;<lpage>95</lpage>.</mixed-citation></ref>
<ref id="ref9"><label>9</label><mixed-citation publication-type="journal"><string-name><surname>Somwanshi</surname> <given-names>DR</given-names></string-name>, <string-name><surname>Humbe</surname> <given-names>VT</given-names></string-name>. <article-title>Half-tone visual cryptography scheme for RGB color images</article-title>. <source>Indian J Sci Technol</source>. <year>2022</year>;<volume>16</volume>(<issue>5</issue>):<fpage>357</fpage>&#x2013;<lpage>66</lpage>.</mixed-citation></ref>
<ref id="ref10"><label>10</label><mixed-citation publication-type="journal"><string-name><surname>Sherine</surname> <given-names>A</given-names></string-name>, <string-name><surname>Peter</surname> <given-names>G</given-names></string-name>, <string-name><surname>Stonier</surname> <given-names>AA</given-names></string-name>, <string-name><surname>Praghash</surname> <given-names>K</given-names></string-name>, <string-name><surname>Ganji</surname> <given-names>V</given-names></string-name>. <article-title>CMY color spaced-based visual cryptography scheme for secret sharing of data</article-title>. <source>Wirel Commun Mob Comput</source>. <year>2022</year>;<volume>2022</volume>:<fpage>1</fpage>&#x2013;<lpage>12</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1155/2022/6040902">https://doi.org/10.1155/2022/6040902</ext-link></mixed-citation></ref>
<ref id="ref11"><label>11</label><mixed-citation publication-type="journal"><string-name><surname>Sharobim</surname> <given-names>BK</given-names></string-name>, <string-name><surname>Abd-El-Hafiz</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Sayed</surname> <given-names>WS</given-names></string-name>, <string-name><surname>Said</surname> <given-names>LA</given-names></string-name>, <string-name><surname>Radwan</surname> <given-names>AG</given-names></string-name>. <article-title>A secured lossless visual secret sharing for color images using Arnold transform</article-title>. <source>in Proc. 2022 Int. Conf. Microelectron. (ICM)</source>, <publisher-loc>Casablanca</publisher-loc>, <publisher-name>Morocco</publisher-name>, <year>2022</year>, pp. <fpage>254</fpage>&#x2013;<lpage>257</lpage>, <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICM56065.2022.10005395">https://doi.org/10.1109/ICM56065.2022.10005395</ext-link>.</mixed-citation></ref>
<ref id="ref12"><label>12</label><mixed-citation publication-type="journal"><string-name><surname>Bhardwaj</surname> <given-names>C</given-names></string-name>, <string-name><surname>Garg</surname> <given-names>H</given-names></string-name>, <string-name><surname>Shekhar</surname> <given-names>S</given-names></string-name>. <article-title>An approach for securing QR code using cryptography and visual cryptography</article-title>. <source>In: 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)</source>; 2022 May 20-21; <publisher-loc>Greater Noida, India</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2022</year>. p. <fpage>284</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref13"><label>13</label><mixed-citation publication-type="journal"><string-name><surname>Siddiqui</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>K</given-names></string-name>, <string-name><surname>Saxena</surname> <given-names>A</given-names></string-name>. <article-title>Multilevel secure multilevel share-based visual cryptography color images for cloud storage</article-title>. <source>In: 2021 2nd International Conference on Computing Methods, Science and Technology (ICCMST)</source>; 2021 Nov 24-25; <publisher-loc>Mohali, India</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2021</year>. p. <fpage>62</fpage>&#x2013;<lpage>7</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICCMST54943.2021.00024">https://doi.org/10.1109/ICCMST54943.2021.00024</ext-link>.</mixed-citation></ref>
<ref id="ref14"><label>14</label><mixed-citation publication-type="journal"><string-name><surname>Vishwakarma</surname> <given-names>S</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>NK</given-names></string-name>. <article-title>An efficient color image security technique for IoT using fast RSA encryption technique</article-title>. <source>In: 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT)</source>; 2021 Jun 24-26; <publisher-loc>Bhopal, India</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2021</year>. p. <fpage>717</fpage>&#x2013;<lpage>22</lpage>.</mixed-citation></ref>
<ref id="ref15"><label>15</label><mixed-citation publication-type="journal"><string-name><surname>Hidajat</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Setiarso</surname> <given-names>I</given-names></string-name>. <article-title>Securing digital color image based on hybrid substitution cipher</article-title>. <source>J Arabic Islamic Stud</source>. <year>2020</year>;<volume>4</volume>(<issue>2</issue>):<fpage>86</fpage>&#x2013;<lpage>95</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.33633/JAIS.V4I2.3380">https://doi.org/10.33633/JAIS.V4I2.3380</ext-link></mixed-citation></ref>
<ref id="ref16"><label>16</label><mixed-citation publication-type="journal"><string-name><surname>Abraham</surname> <given-names>RR</given-names></string-name>, <string-name><surname>Achenkunju</surname> <given-names>JP</given-names></string-name>, <string-name><surname>Thomas</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sekhar</surname> <given-names>GR</given-names></string-name>, <string-name><surname>Oommen</surname> <given-names>RR</given-names></string-name>. <article-title>k-n share generation for securing color images using visual cryptography</article-title>. <source>Int J Eng Res Technol</source>. <year>2019</year>;<volume>5</volume>(<issue>12</issue>):<fpage>339</fpage>&#x2013;<lpage>43</lpage>.</mixed-citation></ref>
<ref id="ref17"><label>17</label><mixed-citation publication-type="journal"><string-name><surname>Arun</surname> <given-names>J</given-names></string-name>, <string-name><surname>Choudhary</surname> <given-names>R</given-names></string-name>. <article-title>Image encryption for secure data transfer and image-based cryptography</article-title>. <source>Int J Eng Res Technol</source>. <year>2018</year>.</mixed-citation></ref>
<ref id="ref18"><label>18</label><mixed-citation publication-type="journal"><string-name><surname>Sathishkumar</surname> <given-names>R</given-names></string-name>, <string-name><surname>Sudha</surname> <given-names>GF</given-names></string-name>. <article-title>Authenticated color extended visual cryptography with perfect reconstruction</article-title>. <source>In: 2017 International Conference on Communication and Signal Processing (ICCSP)</source>; 2017 Apr 6-8; <publisher-loc>Chennai, India</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2017</year>. p. <fpage>609</fpage>&#x2013;<lpage>15</lpage>.</mixed-citation></ref>
<ref id="ref19"><label>19</label><mixed-citation publication-type="journal"><string-name><surname>Tiwari</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>N</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>N</given-names></string-name>. <article-title>Analysis of secret share design for color image using visual cryptography scheme and halftone</article-title>. <source>Int J Comput Appl</source>. <year>2016</year>;<volume>155</volume>(<issue>13</issue>):<fpage>12</fpage>&#x2013;<lpage>6</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5120/IJCA2016912454">https://doi.org/10.5120/IJCA2016912454</ext-link>.</mixed-citation></ref>
<ref id="ref20"><label>20</label><mixed-citation publication-type="journal"><string-name><surname>Johny</surname> <given-names>S</given-names></string-name>, <string-name><surname>Antony</surname> <given-names>A</given-names></string-name>. <article-title>Secure image transmission using visual cryptography scheme without changing the color of the image</article-title>. <source>In: 2015 IEEE International Conference on Engineering and Technology (ICETECH)</source>; 2015 Mar 20; <publisher-loc>Coimbatore, India</publisher-loc>. pp. <fpage>1</fpage>&#x2013;<lpage>3</lpage>.</mixed-citation></ref>
<ref id="ref21"><label>21</label><mixed-citation publication-type="journal"><string-name><surname>Deepa</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Bento</surname> <given-names>B</given-names></string-name>. <article-title>Embedded extended visual cryptography scheme for color image using ABC algorithm</article-title>. <source>In: 2014 12th International Conference on Signal Processing (ICSP)</source>; 2014 Oct 19-23; <publisher-loc>Hangzhou, China</publisher-loc>. <publisher-name>[Place of publication unknown]: IEEE</publisher-name>; <year>2014</year>. p. <fpage>653</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref22"><label>22</label><mixed-citation publication-type="journal"><string-name><surname>Han</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Shang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>He</surname> <given-names>W</given-names></string-name>. <article-title>DWT-domain dual watermarking algorithm of color image based on visual cryptography</article-title>. <source>In: Proceedings of the 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing</source>; 2013 Oct 16-18; <publisher-loc>Beijing, China</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2013</year>. p. <fpage>373</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref23"><label>23</label><mixed-citation publication-type="journal"><string-name><surname>Liu</surname> <given-names>X-Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>M-S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y-L</given-names></string-name>. <article-title>A new color visual cryptography scheme with perfect contrast</article-title>. <source>In: 2013 8th International Conference on Communications and Networking in China (CHINACOM)</source>; 2013 Aug 14-16; <publisher-loc>Guilin, China</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2013</year>. p. <fpage>449</fpage>&#x2013;<lpage>54</lpage>.</mixed-citation></ref>
<ref id="ref24"><label>24</label><mixed-citation publication-type="journal"><string-name><surname>Malik</surname> <given-names>R</given-names></string-name>, <string-name><surname>Chugh</surname> <given-names>S</given-names></string-name>. <article-title>Protection mechanism using cryptography and robust watermarking for color images</article-title>.</mixed-citation></ref>
<ref id="ref25"><label>25</label><mixed-citation publication-type="journal"><string-name><surname>Krishnan</surname> <given-names>G</given-names></string-name>, <string-name><surname>Loganathan</surname> <given-names>D</given-names></string-name>. <article-title>Color image cryptography scheme based on visual cryptography</article-title>. <source>In: 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN)</source>; 2011 Jul 21-22; <publisher-loc>Thuckalay, India</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2011</year>. p. <fpage>404</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref26"><label>26</label><mixed-citation publication-type="journal"><string-name><surname>Kang</surname> <given-names>I</given-names></string-name>, <string-name><surname>Arce</surname> <given-names>GR</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>H-K</given-names></string-name>. <article-title>Color extended visual cryptography using error diffusion</article-title>. <source>IEEE Trans Image Process</source>. <year>2011</year> Jan;<volume>20</volume>(<issue>1</issue>):<fpage>132</fpage>&#x2013;<lpage>45</lpage>.</mixed-citation></ref>
<ref id="ref27"><label>27</label><mixed-citation publication-type="journal"><collab>According to Vancouver style, the citation for "Self-verifying visual secret sharing using error diffusion and interpolation techniques" by Chang C-C, Lin C-C, Le THN, and Le HB would be "Chang C-C, Lin C-C, Le THN, Le HB</collab>. <article-title>Self-verifying visual secret sharing using error diffusion and interpolation techniques</article-title>. <source>IEEE Trans Inf Forensics Secur</source>. <year>2009</year> Dec;<volume>4</volume>(<issue>4</issue>):<fpage>790</fpage>&#x2013;<lpage>801</lpage>."</mixed-citation></ref>
<ref id="ref28"><label>28</label><mixed-citation publication-type="journal"><string-name><surname>Sudharsanan</surname> <given-names>S.</given-names></string-name>, &#x201C;<article-title>Shared key encryption of JPEG color images</article-title>,&#x201D; <source>IEEE Trans. Consum. Electron.</source>, vol. <volume>51</volume>, no. <issue>4</issue>, pp. <fpage>1204</fpage>&#x2013;<lpage>1211</lpage>, Nov. <year>2005</year>, <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/TCE.2005.1561845">https://doi.org/10.1109/TCE.2005.1561845</ext-link>.</mixed-citation></ref>
<ref id="ref29"><label>29</label><mixed-citation publication-type="journal"><string-name><surname>Cimato</surname> <given-names>S</given-names></string-name>, <string-name><surname>De Prisco</surname> <given-names>R</given-names></string-name>, <string-name><surname>De Santis</surname> <given-names>A</given-names></string-name>. <article-title>Contrast optimal colored visual cryptography schemes</article-title>. <source>In: 2003 IEEE Information Theory Workshop (ITW)</source>; 2003 Mar 31-Apr 5; <publisher-loc>Paris, France</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2003</year>. p. <fpage>139</fpage>&#x2013;<lpage>42</lpage>.</mixed-citation></ref>
<ref id="ref30"><label>30</label><mixed-citation publication-type="journal"><string-name><surname>Chang</surname> <given-names>C-C</given-names></string-name>, <string-name><surname>Tsai</surname> <given-names>C-S</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>T-S</given-names></string-name>. <article-title>A new scheme for sharing secret color images in computer network</article-title>. <source>In: Proceedings of the Seventh International Conference on Parallel and Distributed Systems (ICPADS); 2000 Jul 4-7</source>; <publisher-loc>Iwate, Japan</publisher-loc>. <publisher-name>IEEE</publisher-name>; <year>2000</year>. p. <fpage>21</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref31"><label>31</label><mixed-citation publication-type="journal"><string-name><surname>Naor</surname> <given-names>M</given-names></string-name>, <string-name><surname>Shamir</surname> <given-names>A</given-names></string-name>. <article-title>Visual cryptography</article-title>. <source>Advances in Cryptology, EUROCRYPT, Springer-Verlag</source>, vol. <volume>950</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>1995</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>
