“…In recent years, researchers have proposed more SIS schemes, including schemes for color images [12,13], progressive decoding [14,15], meaningful shares [16], and minimizing pixel expansion [17,18], etc. In addition, there exist novel SIS schemes based on various theorems, like matrix theory [19], non-full rank linear model [20] and natural steganography (NS) [21]. More methods of steganography and multimedia security [22,23] are given in these years.…”