Research Article
Quantitative Weighted Visual Cryptographic (k, m, n) Method
Figure 2
Shadow encrypting architecture of the designed RGWVCS. The left half of the encryption architecture describes the generation process of the subpixel and encrypted secret sharing matrices, while the right half is the decryption process of secret sharing matrices.