Research Article
Quantitative Weighted Visual Cryptographic (k, m, n) Method
Table 4
A comparison of series of representative features between the designed scheme and relevant VCSs.
| Proposer | Threshold | Recovery efficiency (complexity) | No pixel expansion | No codebook design | No weight leakage | Weighted |
| Shamir et al. [1] | | | ✗ | ✗ | ✓ | ✓ | Yang et al. [30] | | | ✓ | ✗ | ✓ | ✓ | Tan et al. [40] | | | ✓ | ✓ | ✗ | ✓ | Liu et al. [41] | | | ✓ | ✓ | ✗ | ✓ | Fan et al. [31] | | | ✓ | ✓ | ✓ | ✓ | Tu et al. [32] | | | ✓ | ✓ | ✓ | ✓ | Ours | | | ✓ | ✓ | ✓ | ✓ |
|
|