Next Article in Journal
Standard-Compliant Blockchain Anchoring for Timestamp Tokens
Previous Article in Journal
Are Countermovement Jump Variables Indicators of Injury Risk in Professional Soccer Players? A Machine Learning Approach
Previous Article in Special Issue
Trust Models in Wireless Sensor Networks for Defending Against Denial-of-Service Attacks: A Literature Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares †

Department of Computer Science & Information Engineering, National Chi Nan University, Nantou 54561, Taiwan
*
Author to whom correspondence should be addressed.
Some of the content is presented in the 8th International Conference on Knowledge Innovation and Invention 2025 (ICKII 2025), Fukuoka, Japan, 22–24 August 2025.
Appl. Sci. 2025, 15(23), 12720; https://doi.org/10.3390/app152312720 (registering DOI)
Submission received: 27 October 2025 / Revised: 20 November 2025 / Accepted: 27 November 2025 / Published: 1 December 2025
(This article belongs to the Special Issue Recent Progress of Information Security and Cryptography)

Abstract

With the rapid advancement of technology, data transmission security has become an increasingly critical issue. Visual Cryptography Scheme (VCS) provides a secure method for sharing secret images without complex computation—by stacking multiple shares, the secret image can be visually recognized. The earliest visual cryptography scheme was proposed. However, traditional VCS are limited to the encryption and decryption of a single secret. To address the evolving demands of modern information security, numerous enhanced VCS have been introduced by researchers, offering new perspectives and capabilities. This paper proposes a novel XOR-based visual cryptography scheme that supports fully independent secrets within a (k, n)-threshold framework for 2 ≤ k < n. In the proposed scheme, n shares can simultaneously encrypt C(n, k) distinct secrets. Each secret can be reconstructed by one subset of k shares out of the n, and all shares are designed to be meaningful images so as not to be identified as hiding a secret. This approach significantly enhances the flexibility of VCS, enabling its application in scenarios where different groups hold different secrets or where the reconstructed secret identifies the associated group, which can help administrators know which group has accessed the secret. As such, the proposed scheme is more suitable for a wide range of practical applications.
Keywords: visual cryptography; XOR-based; fully independent; (k, n)-threshold; meaningful shares visual cryptography; XOR-based; fully independent; (k, n)-threshold; meaningful shares

Share and Cite

MDPI and ACS Style

Lee, W.-T.; Juan, J.S.-T. An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares. Appl. Sci. 2025, 15, 12720. https://doi.org/10.3390/app152312720

AMA Style

Lee W-T, Juan JS-T. An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares. Applied Sciences. 2025; 15(23):12720. https://doi.org/10.3390/app152312720

Chicago/Turabian Style

Lee, Wen-Ting, and Justie Su-Tzu Juan. 2025. "An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares" Applied Sciences 15, no. 23: 12720. https://doi.org/10.3390/app152312720

APA Style

Lee, W.-T., & Juan, J. S.-T. (2025). An XOR-Based (k, n) Visual Fully Independent Secrets Sharing Scheme with Meaningful Shares. Applied Sciences, 15(23), 12720. https://doi.org/10.3390/app152312720

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop