{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:09:16Z","timestamp":1776053356409,"version":"3.50.1"},"reference-count":12,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T00:00:00Z","timestamp":1537142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 106-2221-E-260-009-"],"award-info":[{"award-number":["MOST 106-2221-E-260-009-"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system. Several studies have analyzed methods of simplifying the decoding process and refining encoding to pass more secret images through two identical shares. However, limited secret images are retrieved, and the quality of the recovered images is low. This paper proposes an advanced (2, 2)-VSS scheme that can embed N secret images into two rectangular shares. Compared with other related VSS schemes, more secret images can be encrypted and the distortion is adjustable in the proposed scheme, yielding more flexibility in theory and practice.<\/jats:p>","DOI":"10.3390\/cryptography2030024","type":"journal-article","created":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T11:52:29Z","timestamp":1537271549000},"page":"24","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A New Visual Multi-Secrets Sharing Scheme by Random Grids"],"prefix":"10.3390","volume":"2","author":[{"given":"Joy Jo-Yi","family":"Chang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chi Nan University, Nantou 54561, Taiwan"}]},{"given":"Bo-Yuan","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chi Nan University, Nantou 54561, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3654-2560","authenticated-orcid":false,"given":"Justie Su-Tzu","family":"Juan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chi Nan University, Nantou 54561, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2018,9,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","article-title":"Encryption of pictures and shapes by random grids","volume":"12","author":"Kafri","year":"1987","journal-title":"Opt. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Naor, M., and Shamir, A. (1994, January 9\u201312). Visual cryptography. Proceedings of the Advances in Cryptology (EUROCRYPT\u201994), Perugia, Italy.","DOI":"10.1007\/BFb0053419"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1582","DOI":"10.1016\/j.patcog.2008.08.023","article-title":"Image encryption by multiple random grids","volume":"42","author":"Shyu","year":"2009","journal-title":"Pattern Recognit."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2433","DOI":"10.1016\/j.ins.2007.12.016","article-title":"A novel secret image sharing scheme in color images using small shadow images","volume":"178","author":"Chang","year":"2008","journal-title":"Inform. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jvcir.2012.11.001","article-title":"Random grid-based visual secret sharing with abilities of OR and XOR decryptions","volume":"24","author":"Wu","year":"2013","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Chen, T.-H., Tsao, K.-H., and Wei, K.-C. (2008, January 26\u201328). Multiple-image encryption by rotating random grids. Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA\u201908), Kaohsiung, Taiwan.","DOI":"10.1109\/ISDA.2008.141"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Chang, J.J.-Y., Li, M.-J., Wang, Y.-C., and Juan, J.S.-T. (2010, January 26\u201329). Two-Image Encryption by Random Grids. Proceedings of the International Symposium on Communication and Information Technologies, Engineering and Technology (ISCIT2010), Tokyo, Japan.","DOI":"10.1109\/ISCIT.2010.5664885"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2229","DOI":"10.1016\/j.sigpro.2012.02.015","article-title":"Yet another multiple-image encryption by rotating random grids","volume":"92","author":"Chen","year":"2012","journal-title":"Signal Process."},{"key":"ref_9","unstructured":"Chang, J.J.-Y., and Juan, J.S.-T. (2012, January 29\u201330). Multi-VSS scheme by shifting random grids. Proceedings of the World Academy of Science, Engineering and Technology, Tokyo, Japan."},{"key":"ref_10","first-page":"245","article-title":"Visual multi secret sharing by cylindrical random grid","volume":"19","author":"Salehi","year":"2014","journal-title":"J. Inform. Secur. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.displa.2015.09.001","article-title":"Visual multiple-secret sharing for flexible general access structure by random grids","volume":"39","author":"Tsao","year":"2015","journal-title":"Displays"},{"key":"ref_12","unstructured":"Reddy, L.S., and Prasad, M.V.N.K. (2015, January 23\u201325). Extended visual cryptography scheme for multi-secret sharing. Proceedings of the 3rd International Conference on Advanced Computing, Networking and Informatics (ICACNI 2015), New Delhi, India."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:21:03Z","timestamp":1760196063000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/2\/3\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,17]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,9]]}},"alternative-id":["cryptography2030024"],"URL":"https:\/\/doi.org\/10.3390\/cryptography2030024","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,17]]}}}