Table 4 Comparative analysis of resistance to common attack models.

From: Lightweight XOR-based visual cryptography using random shares for secure colour image sharing with minimal shares

Method

Resistance to Known-Plaintext Attack (KPA)

Resistance to Known-Ciphertext Attack (KCA)

Entropy (bits/pixel)

Correlation (r)

Classical XOR-VC12,13

Moderate – random shares but weaker seeding

High – random noise but partial correlation possible

7.95

0.0065

Polynomial-based VC25

High – polynomial interpolation resists mapping

Moderate – partial leakage under limited pairs

7.92

0.0081

CRT-based VC24

High – modular arithmetic enhances protection

Moderate – sensitive to modulus reuse

7.93

0.0079

Proposed XOR-based VC

Very High – independent shares via CSPRNG

Very High – uniform distribution, no leakage

7.997

0.0021