Research Article
Quantitative Weighted Visual Cryptographic (k, m, n) Method
Table 4
A comparison of series of representative features between the designed scheme and relevant VCSs.
| | Proposer | Threshold | Recovery efficiency (complexity) | No pixel expansion | No codebook design | No weight leakage | Weighted |
| | Shamir et al. [1] | | | ✗ | ✗ | ✓ | ✓ | | Yang et al. [30] | | | ✓ | ✗ | ✓ | ✓ | | Tan et al. [40] | | | ✓ | ✓ | ✗ | ✓ | | Liu et al. [41] | | | ✓ | ✓ | ✗ | ✓ | | Fan et al. [31] | | | ✓ | ✓ | ✓ | ✓ | | Tu et al. [32] | | | ✓ | ✓ | ✓ | ✓ | | Ours | | | ✓ | ✓ | ✓ | ✓ |
|
|