Fig. 1From: Improved scheme and evaluation method for progressive visual cryptographyThe secret imageBack to article page