Exploiting the homomorphic property of visual cryptography