Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noiselike meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers’ attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.


Introduction
Internet is one of the most popular but insecure communication mediums.People use the internet for all kinds of communication needs including VOIP, peer-to-peer file sharing, upto-date news reading, e-commerce, and online transactions.Since it is an open and insecure medium, malicious users can intercept data when people transmit personal information.The fast growth of online applications results in the data security problem, which is an important issue for all users.In order to achieve data security, users need secure communication methods for transmitting secret messages over the Internet.Steganography is one of the methods for hiding secret data in a cover medium such as a digital image, a video, or an audio file.Since the cover medium is a meaningful file, attackers do not know that it has hidden data 1-5 .Therefore, malicious users will not pay attention to the file to retrieve the secret data.Encryption is another well-known method for achieving data security.It transforms secret information into an encrypted form, which looks like a random message.Transformation procedure is called encryption process and the result is called cipher text.
In 23 , hypergraph colorings are used to construct meaningful shares as binary images for one secret image.This work, called "Extended Visual Cryptography," deals with binary images.In 17 , Nakajima and Yamaguchi proposed a method that establishes this technique for natural images.Nevertheless, their proposed scheme takes three pictures as input and generates two of them as shares.Third picture, namely, the secret, is obtained by stacking two meaningful shares together.In 19 , Yue and Chiang proposed a neural network approach to generate meaningful shares.This scheme provides gray level shares and gray level decoded secret.In 20 , Zhou et al. propose a halftone visual cryptography scheme and provide shares with visual information.Visual quality of the shares produced by this method has been improved in 21, 22 .The method in 20 requires two shares but one of them must be the negative of the other.A view of the earth from space, meaningful in both positive and negative, is used for testing, but natural images are not appropriate for this method.Shares created by well-known standard test images such as Lena or Baboon would look negative and invite illicit attempts.
However, all these schemes that produce meaningful shares can be used to embed only one secret.Some schemes code multiple secrets into two shares 24-27 .However shares still look like noise images in these methods.Other studies that generate meaningful shares in the literature can code only one secret 17-23 .Therefore, there is a tradeoff between the number of secrets and meaning of shares.In the literature, research is focused on either to increase the number of secrets or to create meaningful shares with one secret.Our method satisfies these two constraints at the same time.
We increase the number of secrets produced by Extended Visual Cryptography 23 .Different from the previous works, two secrets can be embedded into meaningful shares.We also utilize the Wu and Chen coding algorithm to produce fully random share images 28 .Randomness problem in this method is reported by Shyu et al. 26 .Rectangular shares are used in the proposed scheme.First share is produced in a fully random manner as opposed to Wu and Chen's algorithm.Since proposed method produces the first share in a fully random manner, second share can use extended blocks represented by six different patterns.However, Wu and Chen's second share contains only four different patterns because of the first share being composed of exactly the same four regions.The method makes use of two cover images to create friendly shares.Cover and secret images are of the same size.Meaningful shares do not draw attention like random shares.Thus, eavesdroppers do not suspect that meaningful shares contain any secret.
The rest of this paper is organized as follows.In Section 2, we review the visual secretsharing schemes proposed by Wu and Chen.The proposed scheme is introduced in Section 3. The experimental results and discussions are presented in Section 4. Finally, the conclusions and some concluding remarks are given in Section 5.

Chen and Wu's VSS Scheme
Chen and Wu proposed a new 2, 2 visual secret-sharing scheme in 1998.It encrypts two secrets into two shares using share rotation technique.Angle of rotation can only be 90 • , 180 • , or 270 • since shares are square and overlap pixel by pixel for only these rotations.Two N × N halftone secret images are expanded by a factor of 2 in each dimension.In other words, each pixel in secrets is expanded to 2 × 2 extended block to create two shares of size 2N × 2N that will reveal no information about secret images.First secret becomes visible if first and second shares are stacked together.Second secret becomes visible if first share is rotated CCW by 90 • and stacked with second share.Wu and Chen assume that the first share can be segmented  into four regions of triangular shape with equal contents.Triangular regions for a first share of size 6×6 pixels are illustrated in Figure 1.Each 2×2 extended block of the first region in the first share is randomly selected from one of the 2 × 2 patterns in Figure 2. Extended blocks in other regions are assigned to be the same as corresponding extended block in the first region.
At the beginning, they create first share to constitute four triangular regions with equal contents.Each region contains N × N /4-extended blocks.Extended blocks of all four triangular regions are exactly the same to simplify the scheme.Let block j in region k be denoted as b k j for 1 ≤ k ≤ 4 and 1 ≤ j ≤ N × N /4.Extended blocks in the first region are selected in a fully random manner and are copied to corresponding extended blocks in other regions.That is, b t j b 1 j for t 2, 3, 4 and 1 ≤ j ≤ N × N /4.Extended blocks of the second share must be defined according to the value of the corresponding extended blocks of the first share and the pixel values at the relative positions in secret images.
We explain how Wu and Chen's encoding process works by using a simple example.Two secret images and two shares created after encoding process are denoted by P 1 , P 2 , S 1 , and S 2 , respectively.Rotation result of the first share by θ is denoted by S θ • 1 .Rotation angle will be assumed to be 90 • in this example.For simplicity, two secret images of size 6 × 6 pixel are used to create 12 × 12 pixel shares after encoding process.First share can be decomposed into four triangle-like areas where each area has nine extended blocks as shown in Figure 3. Extended blocks labeled with the same number have the same contents to illustrate the dependency.
Let us pay attention to the first pixels at the top left in P 1 and P 2 .Assume that those pixels in P 1 and P 2 are , as shown in Figure 4. Assume that corresponding block b 1 1 at first share is randomly determined as , then as mentioned b 2 1 , b 3 1 , b 4 1 are assigned to be the same as b 1 1 .Corresponding extended block of b 1 1 at S 90 • 1 is the rotation result of , namely .Corresponding extended block in S 2 must reveal black when stacked with extended blocks at S 1 and S 90 • 1 , respectively.Therefore, the pattern that satisfies this constraint is selected among four different patterns , , , that have two white and two black pixels.If the corresponding extended block at S 2 is selected as , stacking this pattern with , , respectively, will reveal the extended blocks that have four black subpixels, which seem black to human visual system.As can be seen in the above example, extended blocks at the first area will be selected randomly, and the other three areas' contents will be the same.Therefore, each extended block of the S 90 • 1 is the rotated result of the corresponding extended block at S 1 .Therefore, Wu and Chen know the corresponding extended block of an extended block at the first share, when the share is rotated.Contrary to proposed method, the table illustrating possible extended blocks for combinations of secret image pixels is definite in their scheme.Let Figure 6 a represent the first share where each extended block is denoted as a i for 1 ≤ i ≤ 36, and Figure 6 b represents the rotation result of first share.a 1 , a 6 , a 6 , a 36 , a 31 , a 1 , and a 36 , a 31 are corresponding extended blocks as can be seen in Figure 6.
Therefore, selected pattern that paints extended block denoted by a 1 affects the selection of the pattern that paints the extended block a 31 during creation of the first share.Actually, there exist dependencies in the selection of the patterns that paint these four extended blocks.An example will show this problem clearly.If a 1 and a 6 are selected in a fully random manner to be , and first pixels of the two secret images are , , respectively, then rotation result of a 6 , that is , will be the corresponding extended block of a 1 .Therefore, corresponding extended blocks at S 1 and S θ • 1 are , .In that case, there is no pattern appropriate to reveal , for corresponding extended block at S 2 .None of the S 2 patterns, when stacked with these extended blocks, reveal pixel values , of two secret images since hamming distance among these two extended blocks is 0. Hamming distance must be either one or two because hamming weight of the patterns to construct the second share is two.Hamming distance cannot be one because all the patterns that will be used for painting the first share have three black pixels and one white pixel.Difference in one pixel due to rotation will result in a hamming distance of two.
Chen and Wu's algorithm selects the same pattern to paint these four extended blocks a 1 , a 6 , a 31 , and a 36 as shown in the example above.When their scheme is applied, same pattern will be used to paint both a 1 and a 6 .If a 1 and a 6 are selected to be , , respectively, corresponding extended blocks at S 1 and S θ • 1 will be , .Any S 2 pattern can be selected for corresponding extended block at S 2 , since hamming distance between these two extended blocks is two.Hamming distance among the corresponding extended blocks will always be two since extended blocks will overlap with their rotated result.All combinations of pixel values represent the corresponding pixel value of two secret images can be coded by selecting an appropriate S 2 pattern.
As can be seen in the above example, Wu and Chen segment the first share into four triangular-shaped regions of equal areas.Since rotated pattern of an extended block in S 1 and corresponding extended block in S 90 As a result, Wu and Chen's algorithm does not need to take into account the dependencies among the extended blocks by copying the same pattern for extended blocks that overlap by rotation.There is an important pitfall in their scheme due to limited randomness of the first share.Since corresponding pixels in each triangular-shaped area are assigned to the same value, first share is not fully random.Only a quarter of the first share is random and the rest of the share is an exact copy of the first triangular area.However, an important issue in the implementation of secret-sharing schemes is the amount of randomness required for generating the shares 26 .Proposed method in this paper creates the first share in a fully random manner as will be explained in the third section of this paper.

Proposed Method
In visual secret-sharing schemes for multiple secrets, each share is a form of random distributed black and white pixels is indistinguishable from random noise .The inconvenience of these schemes is that they use meaningless shares to hide the secrets.A novel 2, 2 visual secret-sharing scheme with meaningful shares is proposed in this section.
Proposed method takes two secret and two cover images as shown in Figure 5. Cover images are used for construction of the meaningful shares.Two secret images are reconstructed by using these two meaningful shares.First share is constructed by using the two secret images and two cover images while second share is constituted by using the two secret images and second cover image.
During the decoding process, the first secret image becomes visible by just stacking the two shares.The second secret is revealed, after rotating the first share by θ degrees and stacking it with the second share.Proposed algorithm constructs the first share in a fully random manner different from Wu and Chen's algorithm.Therefore, pixel values black or white of the cover images can be used for construction of the corresponding extended blocks in meaningful shares.If pixel value in cover image is black at a certain position, the 2 × 2 extended block of a share at that position should have one white and three black pixels.It means that the extended block appears like black as in cover image.If the pixel value is white in cover image, extended block at that position in a share has two white and two black pixels that appear white.Pattern selection process in an extended block will be explained in detail below.When two shares are stacked together, if all of the four subpixels in the 2 × 2 extended block are black, this block represents a black pixel in the secret image.If one white pixel exists in the extended block, this extended block would represent a white pixel.
Hiding two secret images into two covers by the proposed scheme is more efficient than concatenation of two secret images into a single and larger image and then sharing it.Let secret images be of size N × N. Concatenation of these images will result in an N × 2N image.The size of resulting shares would be 2N × 4N if Shamir's visual secret-sharing approach is used.However, the proposed method generates shares of size 2N × 2N with the same hiding capacity.Thus, the proposed method is preferable in terms of storage capacity and bandwidth requirements.

Generation of the First Share
It is supposed that A and B denote the first and second shares, respectively.Besides, let S 1 , S 2 , C 1 , C 2 denote the first and second secrets and cover images of k bit depth, respectively.These four images of size N ×N are transformed into halftone images of only black and white pixels.
We first define two different pattern groups, namely, P b , P w , to be used during share generation process.Pattern groups are the basic constituents of the shares.There are one white and three black pixels in each pattern of the P b , and two white and two black pixels in P w .Six different combinations for P w and four different combinations for P b exist.Each extended block of shares is filled according to these patterns by checking the corresponding pixels of both cover images.For instance, if the cover-image pixel value is black, then the extended block type in a share can be selected from P b .Otherwise, block type is determined among the patterns in P w .This will guarantee generation of meaningful shares at the cost of reduced contrast of cover images.
One should be careful about the order of extended blocks to be set in the first share since the pattern of an extended block will also affect another extended block at the corresponding position when the share is rotated.A Boolean matrix denoted by T of the same size as secrets is used in order to determine the pixel in a secret that has to be processed during the creation of the first share.All the elements of T are initialized to False 0 indicating unprocessed pixels at the beginning.We define a procedure that scans T through rows starting from the leftmost column.First False value's location gives the starting point of the strolling process that will be explained later.Scanning T as explained above yields 1, 1 as the starting point to the strolling process at the beginning.n pixels are processed during each call of the strolling process and corresponding elements n elements of T are set to True 1 .
The value of n depends on the angle of rotation of the first share.During the strolling process, starting point will be processed at first.After that, new coordinates obtained by the rotation transform of starting point's coordinates will be the new pixel position to be processed.New pixel is evaluated if the corresponding value designated by the new coordinates at T is False.Strolling process terminates when the transformation yields the same pixel evaluated in the beginning of the strolling process and corresponding value of T is True which means "processed previously."Because of the nature of the rotation transform, last point will be the starting point after n transforms.For example, let θ be 90 • .In that case, last point will be the starting point after four transformations.So n is 4, 2, 4 for 90 • , 180 • , 270 • , respectively.Example illustration of this strolling process for a secret image of size 4 × 4 pixels is given in Figure 7.
As can be seen in this example, rotation angle determines the number of steps, represented by n, during the strolling process.New coordinates at each step will give the position of the pixels to be taken into account at secret and cover images during strolling process.Extended block at the corresponding position in first share A is determined as follows.
An extended block in A must be defined according to a corresponding 2 × 2 extended block in the rotated A, namely, A , and the pixel values at the relative position of the secrets and cover images.When A and A stack with second share B , the first and second secret images are obtained, respectively.Thus each corresponding extended block pair in A and A will be used while constructing secret images' pixel values at that position.Therefore, if we can select appropriate values for extended blocks in A and A , corresponding extended block in B is easily determined.For the purpose of illustration, assume that two corresponding pixel values at two secret images for an extended block namely, a in A are the , and called p 1 and p 2 , respectively, as shown in Figure 8.These two pixels must be obtained during decoding process via stacking corresponding extended block at A, B and A , B , respectively.Let corresponding pixel values at cover images C 1 , C 2 be , and let them be called c 1 and c 2 .Pixel values at cover images are used in the selection of the pattern for the extended blocks let a, a , b be the corresponding extended blocks in A, A , and B, resp. .
In this example, because c 1 is , P b will be used for the selection of the pattern which will be placed into a.It is to say that extended block, namely, a, contains three black and one white pixel.Besides, let a be the .In order to determine the most appropriate pattern for a, the value of c 2 must be taken into account since c 2 will affect the selection of the pattern that will be used for painting the corresponding extended block b in B. One pattern that seems appropriate for painting a can be an inappropriate candidate for b.Assume that a will be selected randomly as .
As mentioned above, a was .An appropriate pattern for b will be selected from P w since c 2 is white.The selected pattern for b stacked with a and a should result in four black pixels that seem black to the human visual system because p 1 and p 2 are black.Whereas, hamming weight of OR'ed a and a vectors results in 3 giving the number of the white pixels.Since c 2 is white has only two black pixels , any pattern for c 2 could not be able to cover these three pixels.In other words, both of a ⊗ b, a ⊗ b do not reveal black.One can define a rule, that is, "hamming weight of the selected pattern for a OR'ed with a should be less than or equal to the two," for the construction of an extended block in the first share.This rule is valid for only p 1 , p 2 , and c 1 , c 2 , .Determination of appropriate extended blocks that can paint b is shown in Figure 8.
As can be seen in this example, pattern selection for an extended block in first share effects the creation of second share.Therefore, the pattern that paints an extended block in the first share may not be selected in a fully random manner.Selection process takes into account two secret images and two cover images at the same time to determine the appropriate patterns.Thus, the pattern that will paint an extended block in a first share can be selected randomly among the set of patterns resulting from the selection process.
The rule set can be defined as follows by using the pixel values at secret images and cover images.Which pattern group P b or P w to be tested with this rule set is determined by the corresponding pixel value at first cover image.Extended blocks at coordinates obtained by strolling process will be determined by using this rule set.n-extended block in each step during strolling process will be determined.Therefore, strolling process will be called N × N /n time for an N × N secret image.Each execution of strolling process will constitute n-extended block of the first share.
The constraints on the construction of the first share may give an impression that the selection process may not be able to select an appropriate pattern denoted by a in Figure 8 for extended blocks at coordinates obtained by the strolling process.The rules given in the selection process are also generated from the requirements of coding both p 1 and p 2 by taking care of the values of c 1 and c 2 .For example, the reason to select a hamming weight of a or a less or equal to 3 in Rule 1 depends on two criterions; corresponding pixels in both secret images are black and corresponding cover pixel in the second cover image is black.Therefore, selectable patterns for corresponding extended block in the second share b should have exactly three black pixels and one white pixel to both cover a and a' at the same time and to yield black p 1 and black p 2 pixels when overlapped.
It is easy to prove that an appropriate pattern can always be selected by inspecting outcomes of the visual results of the 6 rules given in the selection process.There are a total of 10 different patterns, 6 to represent white and 4 to represent black pixels.In other words, a and a can contain one of the C 10 1 C 10 1 100 possible pattern combinations.Hamming weights of OR'ed, AND'ed, and XOR'ed a and a patterns are given in Tables 1, 3, and 5, respectively.Six rules use these weights to decide whether a pattern is appropriate for a taking into account c 2 .Tables 2, 4, and 6 list all appropriate patterns that can be used for determining a.There exists at least one solution for any p 1 , p 2 , c 1 , and c 2 as can be seen in Tables 2, 4, and 6.Since hamming weight criterion in all rules takes generation of appropriate b into account, at least one solution for b is guaranteed.
The security capability of the proposed method can be analyzed by inspecting these tables.In general VSS schemes, owners cannot extract any information about the secret by inspecting patterns in their shares.Likewise, patterns used for coding the white secret pixels are also used for coding the black secret pixels with equal probability as in general VSS.In the proposed scheme, 10 different patterns are used in both shares to code four different possible combinations of the two secret pixels in regards of cover image pixels.Tables 2, 4, and 6 show the possible solutions for black p 1 and black p 2 , for white p 1 and white p 2 , and for mutually

Generation of the Second Share
Contrary to share A generation, share B generation does not require a strolling process.Extended blocks of first share A are scanned through columns.One extended block from A Table 3: Result of H AND a, a for all possible conditions in Rules 3, 4. and corresponding extended block at A are taken into account together at each step during scanning process.Let a and a be the patterns that paint the relative extended blocks at A and A , respectively.b is defined as a pattern that will paint corresponding extended block at second share.Relative pixel values at two secret images must be obtained when b is stacked with a and a , respectively.Therefore, b should be selected according to both a and a .Appropriate patterns for b can be selected among the patterns at P b or P w .Relative pixel value at the second cover image determines pattern group to be used in order to create shares that look like cover images.Therefore, shares are meaningful images and do not draw Patterns selected according to these rules are appropriate for painting the corresponding extended block at B. A random selection can be made among this pattern set.Therefore selected pattern for corresponding extended block at B will reveal both p 1 and p 2 when stacked with a and a , respectively.Since both extended blocks at A and pixel values of c 2 are taken into account while determining the extended blocks at A during creation of the first share, there is at least one solution for corresponding extended block at B. Second share created by the procedure outlined above looks similar to second cover image, because pattern groups to be tested are selected according to the relative pixel values of second cover image as explained before.

Experimental Results and Analysis
In order to check the validity of the proposed scheme, four gray level test images two for secret images and two for cover images given in Figure 11 are used to create meaningful shares and then reconstruct the secrets.Baboon and Jet, two well-known test images of size 256×256, are used as secret images given in Figures 9 a and 9 b .Figures 9 c and 9 d show two cover images of size 256 × 256, "Lena" and "Girl," respectively.
Proposed method is coded in Matlab 7.0 running on Windows XP Professional computer.GIMP, an open-source image processing application, is used to create Floyd-Steinberg halftone secrets.Since each secret pixel is represented by a 2 × 2 extended block at meaningful shares, the expansion factor is 4. Meaningful shares created by the proposed scheme are given in Figure 10.Rotation angle of 90 • is used but other rotation angles given in Section 3.1 could also be used for the method.First secret is revealed when first and second shares are stacked together whereas second secret is obtained if first share is rotated CCW by 90 • and stacked with the second share as shown in Figures 11 a and 11 b , respectively.
Shares' extended blocks corresponding to black pixels at cover images are represented by three black pixels and one white pixel whereas those corresponding to white pixels have only two black and two white pixels.Therefore, contrast of the cover images is reduced by four, since contrast is the difference between the revealed black and white pixels.Proposed method's contrast ratio is equal to the contrast ratio of "Extended Visual Cryptography" method.In spite of this equality, our method can embed two secrets into two shares, while Extended Visual Cryptography can only encode one secret.Our method uses two different natural images as the cover image, whereas one meaningful share and its negative must be used in 20 , and can only encode one secret.Shares created by this method attract attention of the eavesdropper if a natural image such as Lena is used.Our method can make use of any two different cover images to create shares.Creating natural-looking shares is an important feature of the method to escape illicit attempts.Hiding more than one secret and using two different natural cover images are the superiority of our method different from the work in 20 .So, two parameters meaningful shares and number of secret are utilized by our approach.While our method encodes two secrets, it can also create meaningful shares from two different natural cover images.

Conclusion
Traditional Visual Cryptography encodes the secret into meaningless, noise-like shares.Shares of this nature draw the attention of the malicious users and are not easy to manage 18 .Therefore, research is focused on creating meaningful shares in recent years.VSS schemes that can encode multiple secrets create meaningless shares.Our objective is both increasing the number of secrets and creating meaningful shares at the same time.
A novel 2, 2 Visual Secret-Sharing Scheme is proposed in this paper.Encoding two secrets in two meaningful shares is performed by using share rotation principle introduced by Wu and Chen in 24 .Even though their method creates two seemingly random shares, the first share is only 1/4 random as reported in 26 .In order to create truly random shares, a new encoding scheme, also used in 28 , is utilized and proved to be successful.Creating truly random shares is important for the generation of meaningful shares.Should the first share not be created in a fully random manner, only 1/4 of the share look similar to cover, and other parts will be the rotated result of it contradicting with the friendliness of the share.
Experimental results prove that two cover images and two secrets can be used to create two meaningful shares that look like cover images with decreased contrast ratio.First secret is revealed by stacking two shares, whereas rotating the first share CCW by 90 • and stacking with the second share reveal the second secret.The average Peak Signal Noise Ratio PSNR of shares created with the proposed algorithm with respect to their original halftones cover images is 3.59 dB.This value is equal to PSNR obtained by the shares with Extended Visual Cryptography.With the same visual appearance of meaningful shares, our method can encode two secrets while EVC can encode one secret.
The proposed method works for two secrets to generate two shares with 2 × 2 pixel expansion as 90 • rotation, and perfectly aligning square-shaped shares are assumed.Embedding more than two secrets into meaningful shares and improving the visual quality of both the shares and secrets are considered as a future work.

Figure 2 :
Figure 2: Four patterns to be assigned.

Figure 3 :Figure 4 :
Figure 3: First share of size 6 × 6 pixel and four triangular regions that have nine extended blocks.

Figure 5 :
Figure 5: Coding and decoding phases of the proposed algorithm.

• 1 mustfor k 2 , 3 , 4 .
be the same, an extended block pattern is copied to all extended blocks in S 1 that overlap by rotation.That is, Their second share consists of only four out of six possible patterns excluding diagonals.

Figure 7 :
Figure 7: a , b , c , d , and e represent the strolling process for a 4 × 4 secret image and θ 90 • .

2 Figure 8 :
Figure 8: Determination of an extended block at the first share.

Table 2 :
Selectable a patterns for Rules 1, 2 according to both c 1 and c 2 .exclusivep 1 and p 2 secret pixels, respectively.Since 10 possible patterns exist in all these tables, one cannot conclude the secret pixels' values by just inspecting his/her own patterns.In other words, patterns existing in shares do not reveal any information about the two secret images encoded by them.

Figure 9 :
Figure 9: a First secret, b second secret, c first cover image, and d second cover image.
Hamming weight of the OR'ed vectors a Mathematical Problems in Engineering and a is denoted by H OR a, a , like the hamming weight of AND'ed vectors that denoted by H AND a, a .i Rule 1. "If p 1 is black, p 2 is black, H OR a, a is less or equal to 3, and c 2 is black," then it is an appropriate pattern.ii Rule 2. "If p 1 is black, p 2 is black, H OR a, a is less or equal to 2, and c 2 is white," then it is an appropriate pattern.iii Rule 3. "If p 1 is white, p 2 is white, H AND a, a is greater or equal to 1, and c 2 is black," then it is an appropriate pattern.iv Rule 4. "If p 1 is white, p 2 is white, and c 2 is white," then it is an appropriate pattern.v Rule 5. "If p 1 is white, p 2 is black, and H XOR a, a is greater than 1," then it is an appropriate pattern.vi Rule 6. "If p 1 is black, p 2 is white, and H XOR a, a is greater than 1," then it is an appropriate pattern.
vii Rule 7. Otherwise, it is an inappropriate pattern.

Table 1 :
Result of H OR a, a for all possible conditions in Rules 1, 2.

Table 4 :
Selectable a patterns for Rules 3, 4 according to both c 1 and c 2 .

Table 5 :
Result of H XOR a, a for all possible conditions in Rules 5, 6.

Table 6 :
Selectable a patterns for Rules 5, 6 according to both c 1 and c 2 .Even though shares are meaningful, contrast of the cover images is reduced by a factor of 4.Initially, all patterns that belong to a selected pattern group P b or P w are candidate for b.Only a set of appropriate patterns could reveal original pixel values of both secret images.A rule base is defined to find this appropriate pattern set as follows.Let p 1 and p 2 be pixel values of two secret images and let c 2 be the pixel value of second cover image, respectively.Rule 1.If p 1 is black, p 2 is black, H AND a, b is 0, and H AND a , b is 0, then it is an appropriate pattern.iiRule 2. If p 1 is black, p 2 is white, H AND a, b is 0, and H AND a , b is not 0, then it is an appropriate pattern.iiiRule3.If p 1 is white, p 2 is black, H AND a, b is not 0, and H AND a , b is 0, then it is an appropriate pattern.ivRule 4. If p 1 is white, p 2 is white, H AND a, b is not 0, and H AND a , b is not 0, then it is an appropriate pattern.
Extended Visual Cryptography proposed by Atenies et al. 23 was the milestone in creating meaningful shares.However, this method can encode only one secret into meaningful shares.Some research based on this work is about enhancing the visual quality of meaningful shares 20-22 .VSS schemes that generate meaningful shares dealt with embedding only one secret.