Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain
the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in
Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles
and JavaScript.
Table 8 Comparative analysis of the proposed XOR-based visual cryptography scheme against traditional XOR, polynomial-based, and CRT-based methods in terms of runtime, memory usage, entropy, and PSNR.