“…Therefore, in some situations where a computer is not available to the decipherer, a vision-based secret sharing method provides an apt solution. As regards visual secret sharing research, encryption methods may differ between pixel expansion skill [4,5,6,7,8,9,10,11] and pixel non-expansion skill [12,13,14,15,16]. The majority of the sharing images generated by the above two encryption skills is chaotic, but provides meaningful images [4,9,10].…”