Text this: Analysis and comparison the security and performance of secret sharing schemes