Research Article

Quantitative Weighted Visual Cryptographic (k, m, n) Method

Figure 2

Shadow encrypting architecture of the designed RGWVCS. The left half of the encryption architecture describes the generation process of the subpixel and encrypted secret sharing matrices, while the right half is the decryption process of secret sharing matrices.