Fig. 10From: Improved scheme and evaluation method for progressive visual cryptographyExample of the stable reconstruction process of our schemeBack to article page