A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding
Abstract
1. Introduction
- Compared to [16], the proposed scheme produces meaningful shares: QR codes. The n-th share is meaningless and is hidden within a meaningful image. The sender transmits this meaningful image along with the QR codes to the recipients. The use of meaningful images helps avoid suspicion and enhances the security of the VSS scheme. Furthermore, for both the sender and the receiver, they are easy to manage.
- The QR code shares are error-free, thereby preserving their full error correction capability. Moreover, because QR codes are widely used in everyday communication, their transmission is less likely to raise suspicion among attackers.
2. Preliminaries
2.1. Visual Secret Sharing Scheme
2.2. Related Terms
3. The Proposed Scheme
3.1. The Encryption Process
| Algorithm 1 Encryption algorithm |
| Input: Secret image , QR codes () and . Output: and .
|
3.2. The Decryption Process
| Algorithm 2 Decryption algorithm |
| Input: and . Output: Restored image .
|
3.3. Security Analysis
4. Experiment
4.1. Experimental Results
4.2. The Test of Carrier Images
4.3. The QR Code Scaling Test
4.4. Comparison of Different Schemes
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yang, C.N.; Yang, Y.Y. On the analysis and design of visual cryptography with error correcting capability. IEEE Trans. Circuits Syst. Video Technol. 2020, 31, 2465–2479. [Google Scholar] [CrossRef]
- Rong, R.; Shravage, C.; Mary, G.S.; Blesswin, A.J.; Gayathri, M.; Karunya, A.C.E.; Shibani, R.; Sambas, A. Enhanced Semantic Visual Cryptography with AI-driven error reduction for improved two-dimensional image quality and security. Meas. Sci. Technol. 2024, 35, 105405. [Google Scholar] [CrossRef]
- Tian, A.Q.; Liu, F.F.; Lv, H.X. Snow Geese Algorithm: A novel migration-inspired meta-heuristic algorithm for constrained engineering optimization problems. Appl. Math. Model. 2024, 126, 327–347. [Google Scholar] [CrossRef]
- Gao, S.; Zhang, Z.; Li, Q.; Ding, S.; Iu, H.H.C.; Cao, Y.; Xu, X.; Wang, C.; Mou, J. Encrypt a story: A video segment encryption method based on the discrete sinusoidal memristive rulkov neuron. IEEE Trans. Dependable Secur. Comput. 2025, 22, 8011–8024. [Google Scholar] [CrossRef]
- Mohammed, A.; Samundiswary, P. SecMISS: Secured Medical Image Secret Sharing mechanism for smart health applications. Vis. Comput. 2024, 40, 4251–4271. [Google Scholar] [CrossRef]
- Karolin, M.; Meyyappan, T. Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography. IETE J. Res. 2024, 70, 1638–1645. [Google Scholar] [CrossRef]
- Cheng, X.; Wang, H.; Luo, X.; Guan, Q.; Ma, B.; Wang, J. Re-cropping framework: A grid recovery method for quantization step estimation in non-aligned recompressed images. IEEE Trans. Circuits Syst. Video Technol 2025, 1–15. [Google Scholar] [CrossRef]
- Xiong, L.; Han, X.; Yang, C.N. CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Process. 2021, 185, 108064. [Google Scholar] [CrossRef]
- John, B.; Selva, M.; Gobinath, T.; Divate, M.; Karunya, C.E.; Shahbad, A.A.; Patil, D.; Shibani, R.S. Error-induced inverse pixel visual cryptography for secure QR code communication. J. Auton. Intell. 2023, 7, 1–11. [Google Scholar] [CrossRef]
- Hu, P.; Zhu, J. A filter-wrapper model for high-dimensional feature selection based on evolutionary computation. Appl. Intell. 2025, 55, 581. [Google Scholar] [CrossRef]
- Naor, M.; Shamir, A. Visual cryptography. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1994; pp. 1–12. [Google Scholar]
- Melkemi, M.; Hammoudi, K. Voronoi-based image representation applied to binary visual cryptography. Signal Process. Image Commun. 2020, 87, 115913. [Google Scholar] [CrossRef]
- Kumar, A.; Kumar, A.; Khandelwal, G.; Bhardwaj, Y.; Sharma, V.K.; Sharma, G. Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images. J. Discret. Math. Sci. Cryptogr. 2022, 25, 1113–1123. [Google Scholar] [CrossRef]
- Sun, R.; Fu, Z.; Yu, B.; Huang, H. A novel color multi-secret visual cryptography scheme. In Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, 26–28 June 2020; pp. 140–144. [Google Scholar] [CrossRef]
- Liu, Z.; Zhu, G.; Ding, F.; Kwong, S. Weighted visual secret sharing for general access structures based on random grids. Signal Process. Image Commun. 2021, 92, 116129. [Google Scholar] [CrossRef]
- Yan, X.; Lu, Y.; Yang, C.N.; Zhang, X.; Wang, S. A common method of share authentication in image secret sharing. IEEE Trans. Circuits Syst. Video Technol. 2020, 31, 2896–2908. [Google Scholar] [CrossRef]
- Hou, Y.C. Visual cryptography for color images. Pattern Recognit. 2003, 36, 1619–1629. [Google Scholar] [CrossRef]
- Jia, X.; Wang, D.; Nie, D.; Zhang, C. Collaborative visual cryptography schemes. IEEE Trans. Circuits Syst. Video Technol. 2016, 28, 1056–1070. [Google Scholar] [CrossRef]
- Kannojia, S.P.; Kumar, J. XOR-based visual secret sharing scheme using pixel vectorization. Multimed. Tools Appl. 2021, 80, 14609–14635. [Google Scholar] [CrossRef]
- Shyu, S.J. Image encryption by random grids. Pattern Recognit. 2007, 40, 1014–1031. [Google Scholar] [CrossRef]
- Yang, C.N.; Wang, D.S. Property analysis of XOR-based visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 2013, 24, 189–197. [Google Scholar] [CrossRef]
- Yan, B.; Xiang, Y.; Hua, G. Improving the visual quality of size-invariant visual cryptography for grayscale images: An analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 2018, 28, 896–911. [Google Scholar] [CrossRef]
- Shyu, S.J. XOR-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans. Circuits Syst. Video Technol. 2017, 28, 2397–2401. [Google Scholar] [CrossRef]
- Fu, Z.; Cheng, Y.; Yu, B. Perfect recovery of XOR-based visual cryptography scheme. Multimed. Tools Appl. 2019, 78, 2367–2384. [Google Scholar] [CrossRef]
- Wu, H.C.; Wang, H.C.; Yu, R.W. Color visual cryptography scheme using meaningful shares. In Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications; IEEE: Piscataway, NJ, USA, 2008; Volume 3, pp. 173–178. [Google Scholar] [CrossRef]
- Shivani, S.; Agarwal, S. Progressive visual cryptography with unexpanded meaningful shares. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2016, 12, 1–24. [Google Scholar] [CrossRef]
- Lo, A.H.; Juan, J.S.T. (n, n) XOR-based visual cryptography schemes with different meaningful shares. In Proceedings of the 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 15–17 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1310–1316. [Google Scholar] [CrossRef]
- Wu, X.; Yao, P.; An, N. Extended XOR-based visual cryptography schemes by integer linear program. Signal Process. 2021, 186, 108122. [Google Scholar] [CrossRef]
- Chen, Y.H.; Juan, J.S.T. XOR-Based (n, n) Visual Cryptography Schemes for Grayscale or Color Images with Meaningful Shares. Appl. Sci. 2022, 12, 10096. [Google Scholar] [CrossRef]
- Ren, L.; Zhang, D. A QR code-based user-friendly visual cryptography scheme. Sci. Rep. 2022, 12, 7667. [Google Scholar] [CrossRef]
- Chow, Y.W.; Susilo, W.; Yang, G.; Phillips, J.G.; Pranata, I.; Barmawi, A.M. Exploiting the error correction mechanism in QR codes for secret sharing. In Proceedings of the Australasian Conference on Information Security and Privacy, Perth, Australia, 15 September 2016; Springer: Cham, Switzerland, 2016; pp. 409–425. [Google Scholar] [CrossRef]
- Wan, S.; Lu, Y.; Yan, X.; Wang, Y.; Chang, C. Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J. Real-Time Image Process. 2018, 14, 25–40. [Google Scholar] [CrossRef]
- Lu, J.; Yang, Z.; Li, L.; Yuan, W.; Li, L.; Chang, C.C. Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob. Inf. Syst. 2017, 2017, 4356038. [Google Scholar] [CrossRef]
- Cheng, Y.; Fu, Z.; Yu, B. Improved visual secret sharing scheme for QR code applications. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2393–2403. [Google Scholar] [CrossRef]
- Tan, L.; Lu, Y.; Yan, X.; Liu, L.; Zhou, X. XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multimed. Tools Appl. 2020, 79, 5719–5741. [Google Scholar] [CrossRef]
- Wan, S.; Qi, L.; Yang, G.; Lu, Y.; Yan, X.; Li, L. Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes. Multimed. Tools Appl. 2020, 79, 2789–2811. [Google Scholar] [CrossRef]
- Huang, P.C.; Chang, C.C.; Li, Y.H.; Liu, Y. Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism. J. Inf. Secur. Appl. 2021, 58, 102719. [Google Scholar] [CrossRef]
- Huang, P.C.; Chang, C.C.; Li, Y.H. Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application. J. Internet Technol. 2022, 23, 155–163. [Google Scholar] [CrossRef]
- Hore, A.; Ziou, D. Image quality metrics: PSNR vs. SSIM. In Proceedings of the 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey, 23–26 August 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 2366–2369. [Google Scholar] [CrossRef]
- Tanchenko, A. Visual-PSNR measure of image quality. J. Vis. Commun. Image Represent. 2014, 25, 874–878. [Google Scholar] [CrossRef]
- Sara, U.; Akter, M.; Uddin, M.S. Image quality assessment through FSIM, SSIM, MSE and PSNR-a comparative study. J. Comput. Commun. 2019, 7, 8–18. [Google Scholar] [CrossRef]
- Zxing Library. 2025. Available online: https://github.com/zxing/zxing (accessed on 12 November 2025).
- Standard Test Images. 2025. Available online: https://www.imageprocessingplace.com/root_files_V3/image_databases.htm (accessed on 1 December 2025).






| Carrier Image | Cameraman | House | Jet-Plane | Mandrill | Lake | Peppers |
|---|---|---|---|---|---|---|
| (dB) | 48.1118 | 48.1162 | 48.2813 | 48.1052 | 48.0804 | 48.1117 |
(4, H) | (5, H) | (6, H) | ||||
|---|---|---|---|---|---|---|
|
Original image (the size is [512, 512]) | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (N) | ![]() | (N) | ![]() | (N) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (Y) | ![]() | (Y) | ![]() | (Y) |
| [length , width ] | ![]() | (N) | ![]() | (N) | ![]() | (N) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Liu, T.; Wang, Y.; Yan, X.; Huo, Y.; Lu, C. A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding. Mathematics 2026, 14, 405. https://doi.org/10.3390/math14030405
Liu T, Wang Y, Yan X, Huo Y, Lu C. A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding. Mathematics. 2026; 14(3):405. https://doi.org/10.3390/math14030405
Chicago/Turabian StyleLiu, Tao, Yongjie Wang, Xuehu Yan, Yanlin Huo, and Canju Lu. 2026. "A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding" Mathematics 14, no. 3: 405. https://doi.org/10.3390/math14030405
APA StyleLiu, T., Wang, Y., Yan, X., Huo, Y., & Lu, C. (2026). A Meaningful (n, n)-Threshold Visual Secret Sharing Scheme Based on QR Codes and Information Hiding. Mathematics, 14(3), 405. https://doi.org/10.3390/math14030405








































