Experimental results and analysis demonstrate that the proposed scheme is secure, reliable, easy to implement, and capable of handling binary, grayscale, and color secret images as well as cover images.The characteristics and effectiveness of the proposed algorithm are demonstrated through experiments and comparative analysis. Specifically, we illustrate its application by considering four cover images that share one secret image, implemented using Matlab 2018 programming. The experimental images are shown , and each size is 128ยด128.