“…On the basis of above performance analysis, we can conclude that scheme of [18] is better than other schemes [12,17,20,21,22,23,24,25] whereas scheme [18] has used 21 times multiplication operations. So, it is clear that the proposed scheme is more efficient than other existed literatures [12,17,18,20,21,22,23,24,25] because it uses only 8 times XOR operations which is more efficient than the 21 times of multiplication operations Figures 3 & 4 deduces that the proposed work requires less computation cost as compared to the existing works [12,17,18,20,21,22,23,24,25]. The proposed scheme has used the visual cryptography technique instead of public cryptography, which is simple and easy to implement than public cryptography.…”