Research Article
Quantitative Weighted Visual Cryptographic (k, m, n) Method
Table 3
The contrast of the proposed scheme under the (3, 2, 4) threshold, compared with Tu et al. [
32], Fan et al. [
31], and Yang et al. [
30].
| Collected shadows | Ours | Tu et al. [32] | Fan et al. [31] | Yang et al. [30] |
| | — | 0.1035 | 0.1105 | 0.1096 | | — | 0.1226 | 0.1526 | 0.1531 | | 0.2432 | 0.1505 | 0.1993 | 0.1985 | | — | 0.1681 | 0.1981 | 0.1986 | | 0.2759 | 0.1872 | 0.2486 | 0.2491 | | 0.2962 | 0.2176 | 0.3021 | 0.3045 | | 0.2925 | 0.2249 | 0.2488 | 0.2485 | | 0.3486 | 0.2523 | 0.3038 | 0.3040 | | 0.3821 | 0.2841 | 0.3623 | 0.3642 | | 0.4414 | 0.3192 | 0.4263 | 0.4278 | | 1 | 0.3873 | 0.4988 | 0.4996 |
|
|