Fig. 9From: Improved scheme and evaluation method for progressive visual cryptographyRemarkable examples of the reconstruction process in the basic schemeBack to article page