Quantitative Weighted Visual Cryptographic ( k , m , n ) Method

Institute of Space Weather, Nanjing University of Information Science and Technology, Nanjing, China College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China School of Computer and Big Data Science, Jiujiang University, Jiujiang, Jiangxi 332005, China School of Design, Jiangnan University, Wuxi, China


Introduction
Visual cryptography scheme (VCS) sometimes also called visual secret sharing was formally proposed by Naor and Shamir at Eurocrypt'94 [1], in which they encrypt a binary secret image into multiple shares, and any qualified share combination can recover the hidden secret in the secret image, while any unqualified share combination cannot obtain any content related to the secret information. Here, the set of combinations that meet the conditions and combinations that do not meet the conditions are called a qualified set and a forbidden set, respectively, and the access structure consists of the pair of the qualified and forbidden sets. e (k, n)-threshold scheme [2,3] is a typical case of VCS, in which a binary secret image is encrypted into n shares. Any k or more shares, when superimposed, can reveal the secret image to the naked eye without any computations, while any k − 1 or less shares leak no information about the secret in an information-theoretic sense even with high-performance computing devices and technologies.
As can be seen from the (k, n)-VCS, it encrypts a secret image into visual secret shares so that humans can reconstruct the secret directly with the naked eye without any cryptographic expertise or numerical computation by superposing a qualified visual sharing combination printed on a transparency.
Due to the high security and concealment of VCS, it is essential in the transmission of highly confidential information in a completely hostile channel. More precisely, the problem here is to transmit highly confidential information or authentication information through one or more insecure channels which are under full control of the adversary. Although the emergence of identity authentication technology has made a momentous contribution to keep the identity security, the filch or illegal decoding of smartcard and certificate will pose a high safety hazard. erefore, the visual cryptography technology is combined with the identity authentication to store the shares generated when the identity information is encrypted in the authentication device and the database, respectively. e authentication of the user needs to be decrypted through the superposition of the stored shares, while the attacker cannot obtain any valuable information of the secret image from the individual share through existing analytical methods, and it is impossible to decrypt by forging user shares. In uncontrolled channels, this problem is difficult to solve, and visual authentication [4] has been the main appropriate security solution up to now. e loss of contrast and resolution of the secret image enables the VC to achieve security confidentiality, so in general, the quality of the secret recovered image is lower than that of the original secret image. With the gradual maturity of VC technology, efficiency and security have become the focus [5][6][7]. Scholars have attempted to enhance the contrast and resolution (visibility) of the reconstructed images. To alleviate the pixel expansion in the generated shares, several VCSs without pixel expansion were proposed previously. e VCS based on random grids (RGs) [8,9] are characterized by no codebook design and no pixel expansion. e follow-up research work of RGVCS mainly focuses on a (k, n) threshold [10] and improves image recovered quality [11]. Many other schemes were proposed to realize diversified visual sharing such as halftone secret images [12], grayscale secret images [13], and color secret images [14]. Moreover, some VC extension methods have also been proposed [11,15,16]. In terms of the functionality and security, how to share multiple secrets at one time [17][18][19][20] and prevent participants from cheating [21,22] has become particularly significant in the past few years.

Related Works.
Traditional VCSs mostly devote to optimizing the quality of secret recovered images [23], multilayer secret image encryption [17,19], application of grayscale images and color images [8], and so on. Kannojia and Kumar [24] proposed a XOR-based (n, n)-VCS XOR visual secret sharing scheme using pixel vectorization. e proposed scheme uses implicit codebook and pixel vectorization technology to directly encode the grayscale secret image without converting to a halftone image, which solves the problems of pixel expansion, contrast loss, clear codebook requirements, and restrictions on the number of participants. Shivani et al. [25][26][27] proposed a novel PVSS scheme based on an effective preprocessing method and a basic matrix creation algorithm, which has four or more amounts of space efficiency and meaningful shares. Many avoidable encryption restrictions are solved, and the human visual system can easily decrypt without any cryptographic calculations. Besides, Shivani S also proposed a novel multiple secret sharing scheme with unexpanded shares and meaningful shares, which can protect two secret images at once. e experimental results show that all meaningful shares meet the contrast and safety conditions. e secret image can be easily decoded by the human eye without any calculation [28]. However, traditional VCSs can only handle shares of the same weight and ignore the difference in the importance of shares. erefore, this work considers a weighted VCS with privileged based on random grids, in which secret sharing participant acquires a share with different weights, respectively, according to the importance, and all the eligible participant combinations can recover the secret through the overlay of secret shares. So far, the following VCSs considering the weight difference have been proposed: the privilege-based visual secret sharing model (PVSSM) [29], (2, n)-PVCS [30], random grid-based progressive visual secret sharing scheme with adaptive priority (RGPVSS) [31], and weighted (k, n)-threshold visual cryptography method [32]. In most existing VCSs, each share has the same secret recovery capability. However, in the reality, some participants may enjoy privileges because of their importance or status, e.g., president of company, government official, and so on. Secret image recovery using traditional VCSs cannot highlight their privileges. erefore, Hou et al. [29] proposed a novel secret sharing mechanism PVSSM that combines the concepts of progressiveness and privilege. In PVSSM, n participants with different privileges share a secret image. Set a privilege level (PL) PL i (1 ≤ i ≤ n) for each participant and create corresponding shares to participants based on the PL. e quality of the recovered secret image depends on the importance of all participants. erefore, the higher the privilege level, the more secret information contained in the sharing, and the higher ability to recover the secret image. In this scheme, each share assigned to the participant has the same size as the secret image. PVSSM is capable of encrypting binary and halftone images and can clearly recover the secret information hidden in secret images. Compared with other relevant VCSs, the recovery image in this scheme has a superior contrast (n − 2)/(n − 1). Although the method proposed by Hou et al. assigns different weights to different shares, it is only for the (2, n) threshold. Different weights of shares lead to different average optical transmissions, resulting in the ability to visually distinguish shares, i.e., weight leakage.
To address the issue of weight leakage, Yang et al. [30] proposed a new (2, n)-PVCS to solve the critical problems.
is solution solves the problem that Hou et al.'s scheme is not a general solution to implement all PVCSs with arbitrary privilege level, i.e., it is the general solution of all (2, n)-PVCS. e scheme also overcomes the problem of shadow whiteness inequality and provides the equal whiteness for each shadow. Unfortunately, the (2, n)-PVCS proposed by Yang et al. requires codebook design. en, Fan et al. [31] described a random grid-based progressive visual secret sharing scheme (RGPVSS). In this scheme, the priority weighting of each share can be adjusted, and the secret will be recovered gradually with the increase in the number of shares involved in secret recovery. erefore, as the number of shares superimposed increases, the hidden information in the secret image will be recovered more and vice versa. As a result, each share with different priorities will be generated in this scheme. During secret recovery, the priority weight of the share superimposed determines the extent to which the secret image can be recovered. Each share generated in this scheme has no pixel extension and has the same size as the original secret image. e average light transmission of each share is 1/2, thus preventing the sharing of different priority weights from being discernible. Crucially, for this scheme, codebook design is not indispensable. Tu et al. [32] proposed a weighted (k, n)-threshold nonexpanded visual secret sharing scheme. e secret image can be recovered when the sum of the participant's weights is not less than the threshold k. Unfortunately, the quality of the secret images recovered by the above scheme is not satisfactory. Yan et al. [33] proposed a weighted visual secret sharing scheme to improve the quality of secret restored images. Compared with other schemes, this scheme is mainly different from the generating mode of last n-k bits. Yan et al. [34] also proposed a VCS which the value of the last n-k bits is equal to the first k bits.
e contrast of the secret image recovered by this scheme is significantly improved. To the best of our knowledge, this scheme achieves the most satisfactory contrast in RG-based VCSs. However, although the contrast of the secret restored image is improved, the original secret image cannot be restored losslessly. In the military and medical fields, lossless recovery is essential for image transmission and storage [36].
e study of VCSs with lossless recovery capability has very profound implications. erefore, this paper proposes a weighted VCS with privileged based on random grids, which not only overcomes a series of problems mentioned above but also achieves a lossless recovery of the secret image.

Our Contributions.
In this paper, we propose a novel RGWVC method for a (k, m, n) (m < k) threshold. Compared with the basic WVCSs, the proposed RGWVC considers the possible social stratum differences. In combination with the actual situation, the proposed scheme empowers the secret distributor to designate a privileged role among all the participants, in which the privileged has a greater power for secret recovery than the ordinary participant. Assuming that the privileged joins in the secret recovery, only m shares are required, otherwise at least k shares. More precisely, when privileged share participates in secret recovery, a minimum of m participants is required. e innovation of this scheme compared with the preliminary scheme is that it not only assigns different weights to the participants based on their importance but also gives privilege to the significant shareholder in the secret sharing process. erefore, the proposed scheme can be better applied to practical models such as management pyramid, and the experimental results and the comparison with the existing schemes are shown that the scheme we designed has several highlights as follows: (1) no codebook design, (2) no pixel expansion, (3) no weight leakage, (4) a weighted VCS, (5) (k, m, n) threshold, considering the existence of privileged role, is more applicable to the reality, and (6) improved image quality compared with relevant WVCSs.

Organization.
e rest of this paper is organized as follows. Section 2 reviews preliminaries on the basic WRGVCS. Section 3 presents a generic construction of the designed (k, m, n)-RGWVCS and discusses details and feasibility of the scheme. In Section 4, the experimental results are presented and analysed in the form of pictures and data. Besides, the scheme we designed is compared with several relevant VCSs from the aspects of contrast, pixel expansion, codebook design, and so on. Finally, conclusions and research issues are given in Section 5.

Preliminaries
In this section, we provide some preliminaries including background, definitions, notations, and conditions that will be used later. For more details about information theory and the definition of secret sharing, see, e.g., [36][37][38].

Weighted Random Grid-Based VCS (WRGVCS) for a (k, n)
reshold. e weighted random grid-based visual cryptographic scheme (WRGVCS) is the basis of the proposed scheme. is method can assign weights to each participant of different importance so that each share has different ability to restore the secret image. Our visual cryptography scheme inherits the advantages of WRGVCS and considers the possible privileged role in the reality, which increases the practicality of the scheme and makes it more comprehensive.

Monte Carlo Method.
Monte Carlo method is a numerical simulation method. It takes probabilistic phenomena as its research objective. In equipment effectiveness evaluation, it is often used to determine the efficiency index with random factors, such as the probability of discovery, the probability of hit, and the average number of damaged targets. e simulation processes are described as follows.
(1) Construct a simple and feasible stochastic or probabilistic model to describe the problem. e solution of the proposed problem is bound to some features of the random variables in the model (such as probability, mean value, and variance); (2) Generate a sufficient amount of random numbers according to the different distribution of each random variable in the stochastic or probabilistic model; (3) Design a sampling method suitable for the probabilistic model and random variable distribution; and (4) According to the established model, the simulation test and calculation are carried out to obtain the random solution of the problem.

Indispensable Notations and Definitions.
In this section, we will introduce some notations and definitions to prepare for the further work. Later, the symbols ⊗ and ⊕ represent the Boolean XOR and OR, while b represents a bitwise complementary operation of any binary bit b. In the visual secret sharing scheme, we generate n secret shares to hide the binary secret image S with size H × W, defined as M 1 , M 2 , · · · , M n . e corresponding secret recovery image S′ is reconstructed from any p(k ≤ p ≤ n, p ∈ Z + ) shadows M i1 , M i2 , · · · , M ip by a superposing operation. e white and black areas of the secret image S are denoted as CS0 and For any pixel in S, P(s � 0) represents that the probability of pixel color is transparent or white (0), whereas P(s � 1) represents that the probability of pixel color is opaque or black (1). In addition, Based on above notations, we will give the definition of contrast.
Definition 1 (contrast). e contrast can describe the quality of the recovered secret image, denoted as α, as follows [34]: where P 0 and P 1 denote the correctly and incorrectly revealed probabilities for the white and the black areas of S′, respectively, α ∈ [−0.5, 1], which is proportional to the quality of the secret restored image after superposition. In secret recovery, α � 0 means S′ has nothing to do with S while α � 1 indicates S′ is the same as S, a.k.a., S is lossless. Figure 1 shows the change of contrast under different values of P 0 and P 1 in formula (1) by using the heatmap. It can be seen from the figure that the contrast is positively correlated with P 0 and negatively correlated with P 1 . When P 0 � 1 and P 1 � 0, the contrast value is 1, indicating that the image is lossless. erefore, contrast is a very convincing indicator used to evaluate the quality of S′ compared with S, and it is adopted to determine whether the naked eye can recognize the secret in the recovery image in this paper. For the different contrast ranges for different clarity, see [39].

Feasibility and Safety Conditions.
In this part, we will introduce two necessary conditions to verify the feasibility and security of the proposed scheme, in terms of secure encryption and visual decryption.
In the visual cryptography scheme, the ultimate goal is to realize the visualization of secret under the condition of meeting the requirements of the scheme. erefore, a qualified visual cryptography scheme must meet the following condition in visual recognition: Condition 1 (visually recognizable). e recovery image S′ is visually recognizable (α > 0) when p ≥ k, a.k.a., S′ can visually recognize the same secret as S with sufficient shadows [1,32].
In the visual cryptography scheme, the security of encrypted secret is of capital importance. erefore, a secure visual cryptography scheme must meet the following condition in secret recovery.
Condition 2 (security). e secret recovery image S′ is visually unrecognizable (α � 0) when p < k, a.k.a., S′ will not give away any information about the secret if there is not enough shadow overlay during the recovery process.

The Proposed (k, m, n)-RGWVCS
Based on the basic WRGVCS described in the previous section, we designed a new (k, m, n)-RGWVCS (m < k) that takes privileged role into account, in which the privileged people have a better decryption ability than nonprivileged. In the following section, we will first introduce the construction of (k, m, n)-RGWVCS, then analyse the advancement of the scheme, demonstrate its safety and feasibility, and finally analyse the application of the scheme in practice.

Construction of (k, m, n)-RGWVCS.
e proposed (k, m, n)-RGWVCS (1 ≤ m ≤ k < n), considering the privileged in secret recovery, can be implemented by the combination of binary matrices M 1 , · · · , M n and weight of n participants ω 1 , ω 2 , · · ·, ω n (where ω 1 + ω 2 + · · · + ω n � 1). ere are n participants involved in the VCS in all, and the addition of the privileged person allows the secret recovery to be completed with only m participants, rather than at least k participants in the conventional scheme. In this section, we will give a detailed description of the proposed algorithm and analyse its feasibility. Construction 1 shows the proposed (k, m, n)-RGWVCS, which satisfies Condition 1 and Condition 2. Construction 1. For every pixel, assign the n sharing matrixes using the Monte Carlo method with 0, 1 { } randomly. If the privileged is not considered, select k or more matrixes as the candidate of the secret recovery; otherwise, select m or more shares matrixes. en, flip an element randomly if their superposition of these shares is not equal the secret pixel value. After the above operations, we will get the n secret sharing matrices.
e detailed steps are listed as Algorithm 1.
As can be seen from Figure 2, it provides a visual overview of the encryption and decryption secret image into n subpixels and generates n secret sharing matrices, while the right half discusses the different cases of pixel stacking and recovery. e secret sharing matrix and the secret image have the same attributes except the different distribution of pixel values. Different quality secret images can be recovered when the secret sharing matrix meets the quantity requirement.

Encryption of Single Pixel.
After the overall grasp of the shadow encryption architecture in the previous section, this section will analyse the details of the right half of Figure 2.
is part is mainly responsible for superimposing n subpixels generated by each single pixel of S. In the ordinary VCS schemes, both the original secret and the generated share are data in numerical form, which are finally calculated and decrypted by the computer. In VCS schemes, however, both the original secret and the secret recovered by superposition are visible, i.e., the naked eye can decode directly. All black and white pixels in S are encrypted into corresponding sets of black and white subpixels in secret shares. erefore, each subpixel set is able to be denoted as a set of matrices represents black pixel and b � 0 otherwise and c b ij � 1 represents a black j-th strategy in the i-th share and c b ij � 0 otherwise. For the sake of clarity, (2, 2)-threshold VCS is taken as an illustrative example where S is encrypted into two shares. All the shares generated are noisy images, and so no secret information could be obtained. Nevertheless, when the generated two shares are superimposed, S can be restored, and its construction method is as follows.
One black-white pixel e is splitted from original image into two black-white subpixels. If e is black (resp., white), then Strategy 1 or Strategy 2 in the lower (resp., upper) row of Table 1 is randomly selected, and the overlay of all subpixels is entirely black (resp., entirely white). As a result, the initial secret image can be capable of recovering lossless assuming that all shares are superimposed. is structure can be indicated as the sets C 0 and C 1 of matrices in Table 1; more specifically, the above encoding and decoding procedures can be indicated as the function Enc: for b ∈ 0, 1 { } and M � (m ij ) ∈ 0, 1 { } 2×2 , respectively. From the function operation, we can see that when the XOR operation result is different from the original secret pixel, we only need to invert the pixel value of any secret sharing matrix. erefore, in the initial generation of subpixels, we can randomly select the values without considering whether the results of all pixel XOR are correct. If the result of the pixel set XOR is not correct, take the reverse correction.
Pixel expansion refers to the number of subpixels in shares encrypted from a secret pixel. In the example above, each pixel in the secret image is encrypted as a subpixel in each share. erefore, there is no pixel extension. e degree of pixel expansion is negatively correlated with the actual resolution of the share image. A VCS with the lowest pixel extension indicates that its encryption is optimal.

Instance of (k, m, n)-RGWVCS.
rough the above analysis of the shadow encryption system, we can have a sense of the system. In this section, we will demonstrate the detailed process of encryption and decryption using an instance (3, 2, 4)-RGWVCS. us, we will have a clearer and more specific understanding of the shadow encrypting architecture. In the (3, 2, 4)-RGWVCS, the secret image needs to be encrypted into 4 secret sharing matrices with the same size. During the decryption side, it requires at least 2 shares to complete the secret recovery when the privileged participate in, whereas at least 3 shares are required.
For each pixel of S, the same position of the 4 secret sharing matrices, M 1 , M 2 , M 3 , M 4 , is randomly initialized to 0 or 1 by the Monte Carlo method, then m 1 ⊕ m 2 ⊕ m 3 ⊕ m 4 is calculated, and it is compared with the pixel of S. If the comparison result is inconsistent, the random one of the four pixels is reversed. When all pixels of S are handled, 4 secret sharing matrices in the final form of noise are generated. Next, we will prove the feasibility of the Monte Carlo method (Analysis 1).

Analysis 1.
In the proposed RGWVCS scheme, step 1 (initialize n zero secret sharing matrices with weight ω i ) satisfies the completely random fairness principle.
Proof. In the proposed scheme, we use the Monte Carlo method to achieve secret layering according to the weight, in which 1000 groups of random cast experiments are conducted on four targets with equal probability by the Monte Carlo method. e experimental results are listed in Figure 3. e unit square plane in Figure 3 is divided into four areas with the same size: S1, S2, S3, and S4, and then 1000 points are scattered on the plane with equal probability. e dots are randomly placed in different regions, and the dots in different regions are assigned different colors. rough experiments and statistics, we can see the projection of 1000 points in the four regions in Figure 3(a) and its statistical results in Figure 3(b). e probability of hitting S1, S2, S3, and S4 is 25.9%, 24.7%, 25.7%, and 23.7%, respectively. When subtracted from the average, it was +0.9%, −0.3%, +0.7%, and −1.3%, respectively. From the above data analysis, we can draw a conclusion that the hit ratio of these four regions is nearly the same, indicating that in the designed RGWVCS scheme, the Monte Carlo method satisfies the completely random fairness principle.

Feasibility and Safety Analysis.
After the detailed introduction and analysis of the relevant algorithms, we will carry out theoretical analysis on the security and visual recognition of the designed scheme from Conditions 1 and 2.
(1) Initialize n zero secret sharing matrices M i � m i (s, t) � 0|1 ≤ s ≤ H, 1 ≤ t ≤ W with weight ω i , (i � 1, 2, · · ·, n), i.e., the probability of M i participates in the secret recovery is ω i . (2) For any pixel m i (s, t) in M i , assign 0, 1 { } randomly to it using the Monte Carlo method. (3) Assume the p-th participant is a privileged person. ere are two cases as follows: (a) If M p participates the secret recovery, select j secret sharing matrices randomly, i.e., M i1 , M i2 , · · ·, M ij (1 ≤ i ≤ n, m ≤ j ≤ n); (b) If M p is not involved the secret recovery, select j secret sharing matrices randomly, i.e., M i1 , M i2 , · · ·, M ij (1 ≤ i ≤ n, k ≤ j ≤ n).
(4) Select c ∈ 1, 2, · · ·, j randomly and execute the following formula: Q n initial secret sharing matrices n encrypted secret sharing matrices Security and Communication Networks Proof. In the proposed (k, m, n)-RGWVCS from Construction 1, 0, 1 { } are assigned to m 1 (s, t), m 2 (s, t), · · · , m n (s, t)} randomly using the Monte Carlo method in the third step. at means that the probability of m being equal to 0 and 1 is equivalent, i.e.,

Theorem 1.
e designed scheme is an effective (k, m, n)-RGWVCS structure.

Proposition 1.
e scheme is designed to take the possible existence of the privileged into account.

Proof.
rough the analysis of the designed method, a larger weight leads to a larger probability of covering m 1 (s, t), m 2 (s, t), · · · , m k (s, t), because the k initial secret sharing matrices M 1 , M 2 , · · ·, M n are constructed corresponding to ω 1 , ω 2 , · · ·, ω n in the first step of Algorithm 1.
is indicates that α i 1

Practical Application.
ere is a lot of class division in real life, and being high class also means having certain privileged rights. e traditional visual secret sharing scheme ignores the existence of real privileges and becomes unsuitable for all real situations. e weighted visual secret sharing scheme with privileges can solve this problem well. e following company is taken as an example. In this case of the company above, there are two classes, including manager and clerk. Managers are superior to their clerks and thus have a greater capacity of secret recovery. It can be seen from Figure 4 that when m ≤ n ≤ k , the combination of n clerks cannot recover S, while the combination of a manager and n − 1 clerks can recover S, highlighting the effectiveness of the privilege. When n ≥ k, although the shares of n clerks can recovery the secret image, the quality of S′ is lower than that recovered by one manager and n − 1 clerks. It also highlights the superiority of the privilege enjoyed by the privileged. Most of the existing weighted visual secret sharing schemes give high-weighted participants the privilege of recovering higher-quality secret images. However, the proposed visual secret sharing scheme considering the privileged not only gives the privileged that right but also gives the privileged the privilege to be capable of recovering S while the same number of ordinary participants cannot recover S. is makes the privileged more prominent and more relevant to the actual situation.

Experimental Results and Discussion
In this section, we will show the performance of RGWVCS through experimental results, in which the validity of the scheme is verified from the quality and characteristics of the encrypted and decrypted images, and the superiority of the scheme is illustrated by comparing with other schemes.

Display of Image Recovery.
In the designed RGWVCS for (3,2,4) threshold, secret image S is divided into four encrypted images M 1 , M 2 , M 3 , and M 4 . When the privileged people are considered in the secret recovery, at least two encrypted images are required for restoring the secret. Conversely, when no privileged people participates in the secret recovery, a minimum of three encrypted images are required.
It can be seen from Figure 5 that when S q � 1, what is displayed is the encrypted images M 1 , M 2 , M 3 , and M 4 . When S q � 2, the result of any two encrypted images superimposed is shown in the figure. e figure shows that half of the six possible combinations can complete the secret recovery. e commonality of the combinations that can complete the secret recovery is that they all contain the privileged M 4 . is is in line with the designed scheme that only m(m � 2) participants are needed to complete the secret recovery when the privileged participates in the secret recovery. In terms of the recognition of recovered secrets, it can be concluded that the superimposed weight is proportional to the secret recognition. When S q � 3, any combination of three encrypted images can accomplish the secret recovery. As with S q � 2, the greater the total weight of participants, the higher the degree of secret identification. When S q � 4, i.e., all participants M 1 , M 2 , M 3 , and M 4 are superposed together, it can recover S losslessly. e recovered S′ is identical to the binary secret image S(α � 1).
So, according to the above analysis, we can draw the following conclusions: (1) e experimental results of S q � 2 and S q � 3 agree with the (3, 2, 4) threshold, and the design idea of considering the privileged is at least three participants are needed to complete the secret recovery when the privileged is not considered; otherwise, only two participants are needed. (2) e quality of secret recovery is proportional to the total weight of participants.

Contrast and Weight Analysis.
In this section, we will first use the contrast as the main indicator to accurately describe the quality of the recovered secret images from different combinations. en, we will analyse the relation between contrast and weight. Finally, we will compare the contrast between our scheme and relevant schemes. From Table 2, we can see that the contrast obtained by the superposition of any two encrypted images in M 1 , M 2 , and M 3 is always 0. Once M 4 participates in the secret recovery, it only needs 2 encrypted images to restore S that can be recognized by the naked eye. With the increase in the total weight of the participants, the recognition degree of the secret image is also higher; that is, the clarity of the secret is directly proportional to the total weight of the participants. e analysis shows that the contrast is positively correlated with the weight, and the image quality after recovery is better than relevant schemes. In Figure 6, we analyse the relation between the contrast and total weight of the decrypted image with the different combinations, where Q 1 , Q2, Q 3 , and Q 4 are the four abnormal points. For Q 1 , the total weight of the participants ω(ω � 0.5) is the same in combination M 2 ⊕ M 3 and M 1 ⊕ M 4 . However, M 2 ⊕ M 3 cannot recover the secret while M 1 ⊕ M 4 can make the secret identifiable. is phenomenon of the same weight but different decoding ability shows the superiority of the privileged in the designed scheme. For Q2 and Q 3 , as can be seen from the figure, the trend around Q2 and Q 3 is basically the same. Both Q 3 and Q 3 are maximum points, which indicates that the contrast is positively correlated with the total weight. For Q 4 , the total weight at this point is as high as 0.9 while the contrast is only 0.4189. is phenomenon of high weight and low contrast is in urgent need of solution. In terms of the rest of the features, the designed scheme has the following characteristics: (1) no pixel expansion; (2) no codebook design; and (3) no weight leakage.
For fear of the influence of randomness of the secret image in above part, we carried out much more identical tests with the designed scheme and other related schemes, in which we selected randomly 100 binary images with different sizes and patterns for encryption and decryption. Finally, we calculated the average contrast for different combinations in 100 tests to prove the superiority of the designed scheme. In the experiment, we set that k � 2, n � 4, ω 1 � 0.1, ω 2 � 0.2, ω 3 � 0.3, and ω 4 � 0.4. Table 3 shows the contrast values of the secret restored images after superimposed with the proposed privileged scheme and the relevant representative WVCS schemes. e results show that the image restoration quality of the proposed scheme is superior to that of other schemes in general except for {3, 4}. Since in the proposed scheme, the n − k bits in the tail must have the same value as a random bit in the front k bits, and thus in the secret recovery phase, the proposed scheme improves the coverage of the front k bits and enhances the clarity of the secret image recovered after superposition.

Feature Comparison.
In this section, we will compare the quality of the recovered image and a series of characteristics of the proposed scheme with some typical WVCS schemes with admirable features, such as Yang et al. [30], Fan [31], and Tu et al. [32] schemes. While we are concerned about the quality of the recovery image, we are also concerned about other features of the designed scheme, such as pixel expansion, codebook design, and weight leakage.
In Table 4, our design scheme is compared with other related schemes in a series of main features where the threshold value represents the threshold parameter supported by the scheme; recovery measure refers to the recovery methods that may be used by the solution; no pixel expansion indicates that the share distributed to the participants has the same size as S; no codebook design means that there is no codebook design in the generation phase of shares; and the scheme will be more secure and practical without weight leakage after weighted treatment.
From Table 4, we can see that the proposed RGWVCS has the following superiorities: (1) there is no pixel expansion; (2) no codebook design; (3) (k, m, n) threshold, the privileged are considered in the scheme; (4) the generated shares have no weight leakage; and (5) the image quality is better than that of the correlation weighted scheme, and the secret image can be recovered losslessly. To sum up, in a series of representative characteristic indicators, the scheme we designed is superior to other relevant schemes.
After comparing the characteristics of different schemes, we use the objective evaluation index recall to quantitatively compare our scheme with others. e formula of recall is as follows, where TP is the number of samples with the restored pixel value of 1 and the judgment is correct, and FN is the number of samples with the restored pixel value of 0 and the judgment is wrong. It can be seen from Figure 7 that the program proposed in this paper has an average recall of 87.6% due to the addition of the privilege mechanism, which is higher than all the schemes that participated in the comparison. e schemes proposed by Tan 1 :manager Figure 4: Schematic of an instance of privilege in a company situation, consisting of two distinct classes of manager and clerk. e two classes have different secret image recovery ability: (a) m ≤ n ≤ k and (b) n ≥ k.  Figure 6: e relation between the contrast and total weight of the decrypted image with different combinations.  [1] (k, n) OR(O(1)) 7 7 ✓ ✓ Yang et al. [30] (2, n) OR(O(1)) ✓ 7 ✓ ✓ Tan et al. [40] (k, n) Modular (O(k)) ✓ ✓ 7 ✓ Liu et al. [41] (k, n) OR/XOR (O(1)/O(k)) ✓ ✓ 7 ✓ Fan et al. [31] (k, n) OR(O(1)) ✓ ✓ ✓ ✓ Tu et al. [32] (k, n)

Conclusions
e traditional (k, n)-threshold visual secret sharing scheme encrypts a secret image into n noise shares, and the hidden secret in the secret image can be recovered by superimposing k or more shares. Nevertheless, those methods did not consider differences in the importance of participants, so each participant in the scheme has the same level of privilege, that is, the same secret recovery capability. is paper designs a novel random grid-based weighted visual cryptography scheme for a (k, m, n) (m < k < n) threshold (RGWVCS). is scheme takes the differences between privileged participants and ordinary participants into account and gives the privileged people a better decryption ability than ordinary people. When privileged people participate in secret recovery, only m participants are needed, and when no privileged person participates, k participants are needed. rough the analysis of the experimental results and the comparison with the relevant schemes, the designed scheme has several features as follows: (1) there is no pixel expansion; (2) no codebook design; (3) (k, m, n) threshold, the privileged are considered in the scheme, (4) the generated shares have no weight leakage, and (5) the contrast of the designed RGWVCS is, on average, increased by 32.85% compared with the relevant schemes which shows that the image quality of the revealed secret image is greatly enhanced. In the future, we will further modify the algorithm to improve the resolution of secret images and the security of encryption. Furthermore, the current visual secret sharing scheme can only be used for binary image encryption, and grayscale and color images cannot be well encrypted and restored. We will work to make the designed scheme also applicable to the encryption of grayscale and color images.

Data Availability
Some or all data, models, or code that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest
e authors declare that they have no conflicts of interest regarding the publication of this paper.