Fig. 4From: Improved scheme and evaluation method for progressive visual cryptographyBest and worst qualities of \(R_3\) generated by the basic schemeBack to article page