Fig. 8From: Improved scheme and evaluation method for progressive visual cryptographyAmount of information C in \(R_3\) of two schemesBack to article page