Research Article

Quantitative Weighted Visual Cryptographic (k, m, n) Method

Table 4

A comparison of series of representative features between the designed scheme and relevant VCSs.

ProposerThresholdRecovery efficiency (complexity)No pixel expansionNo codebook designNo weight leakageWeighted

Shamir et al. [1]
Yang et al. [30]
Tan et al. [40]
Liu et al. [41]
Fan et al. [31]
Tu et al. [32]
Ours