Research Article

Quantitative Weighted Visual Cryptographic (k, m, n) Method

Table 3

The contrast of the proposed scheme under the (3, 2, 4) threshold, compared with Tu et al. [32], Fan et al. [31], and Yang et al. [30].

Collected shadowsOursTu et al. [32]Fan et al. [31]Yang et al. [30]

0.10350.11050.1096
0.12260.15260.1531
0.24320.15050.19930.1985
0.16810.19810.1986
0.27590.18720.24860.2491
0.29620.21760.30210.3045
0.29250.22490.24880.2485
0.34860.25230.30380.3040
0.38210.28410.36230.3642
0.44140.31920.42630.4278
10.38730.49880.4996