The document discusses visual cryptography and an extended visual cryptography scheme (EVCS). Visual cryptography allows a secret image to be encrypted into shares or transparencies that are distributed to authorized recipients. When the shares are overlaid, the secret image is revealed visually without any computation. The EVCS improves upon traditional visual cryptography by embedding the shares into meaningful cover images. This hides the fact that an image is being transmitted secretly. The document outlines the implementation of the EVCS mechanism, including using a halftoning technique and dither matrix to divide images into shares. It also describes the system design for a visual cryptography tool, including the user interface, software requirements, and design diagrams. Experimental results showed the tool could encrypt grayscale images into