This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares †
by
Wen-Ting Lee
Wen-Ting Lee and
Justie Su-Tzu Juan
Justie Su-Tzu Juan *
Department of Computer Science & Information Engineering, National Chi Nan University, Nantou 54561, Taiwan
*
Author to whom correspondence should be addressed.
†
Some of the content is presented in the 8th International Conference on Knowledge Innovation and Invention 2025 (ICKII 2025), Fukuoka, Japan, 22–24 August 2025.
Appl. Sci. 2025, 15(23), 12720; https://doi.org/10.3390/app152312720 (registering DOI)
Submission received: 27 October 2025
/
Revised: 20 November 2025
/
Accepted: 27 November 2025
/
Published: 1 December 2025
Abstract
With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares, the secret image can be visually recognized. The earliest visual cryptography scheme was proposed. However, traditional VCS are limited to the encryption and decryption of a single secret. To address the evolving demands of modern information security, numerous enhanced VCS have been introduced by researchers, offering new perspectives and capabilities. This paper proposes a novel XOR-based visual cryptography scheme that supports fully independent secrets within a (k, n)-threshold framework for 2 ≤ k < n. In the proposed scheme, n shares can simultaneously encrypt C(n, k) distinct secrets. Each secret can be reconstructed by one subset of k shares out of the n, and all shares are designed to be meaningful images so as not to be identified as hiding a secret. This approach significantly enhances the flexibility of VCS, enabling its application in scenarios where different groups hold different secrets or where the reconstructed secret identifies the associated group, which can help administrators know which group has accessed the secret. As such, the proposed scheme is more suitable for a wide range of practical applications.
Share and Cite
MDPI and ACS Style
Lee, W.-T.; Juan, J.S.-T.
An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares. Appl. Sci. 2025, 15, 12720.
https://doi.org/10.3390/app152312720
AMA Style
Lee W-T, Juan JS-T.
An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares. Applied Sciences. 2025; 15(23):12720.
https://doi.org/10.3390/app152312720
Chicago/Turabian Style
Lee, Wen-Ting, and Justie Su-Tzu Juan.
2025. "An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares" Applied Sciences 15, no. 23: 12720.
https://doi.org/10.3390/app152312720
APA Style
Lee, W.-T., & Juan, J. S.-T.
(2025). An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares. Applied Sciences, 15(23), 12720.
https://doi.org/10.3390/app152312720
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.