With the increasing threats on multimedia information sharing, degradation of security is one of the most important concerns. Visual Cryptography is an emerging field for improving the security level by encoding the secret video using encryption scheme and performs computational free decoding process. The secret sharing through visual cryptographic techniques for multiple stack users is not sufficient in providing high percentage result on video sharing domain. Video sharing did not develop source key properties for individual frames and as a result the quality estimation strategy on video frame was not achieved. Moreover, the target rate constraint for video quality under the encryption-decryption was not achieved. This encryption-decryption target key rate declines on arranging multiple sequences of frames from multiple stack users. To improve the quality of visual secret video sharing scheme, a Discrete Cosine Transform Chaos Cryptographic (DCTCC) mechanism is proposed in this paper. The main objective of DCTCC is to enhance the security level of different level video frame using the encryption key properties. Initially, sender takes the video of differing frame length and compresses the video on image using the Discrete Cosine Transformer. The Discrete Cosine Transformer based visual secret sharing of video in the image takes the luminance values and provides high lossless compression. Second, the embedded video frame is encrypted to perform the secret sharing (i.e., visual cryptographic) using the chaos method. The Chaos method uses the enhanced RSA key properties to improve the video quality estimation strategy. Chaos method in DCTCC works effectively with non-linear dynamic set of video frames from users and also with the discrete time dynamical video cryptographic system. On the decryption side, the chaos method is applied in the reverse procedural order to fetch the video quality of video frames from original image. Experiment is conducted on factors such as mean square error rate, and secret video sharing efficacy level and encryption time.