Fig. 5From: Improved scheme and evaluation method for progressive visual cryptographyTwo reconstructed images of \(R_3\) generated by our schemeBack to article page