Figure 5From: Progressive sharing of multiple images with sensitivity-controlled decoding Secret recovery in methods 1 to 2. We copied data of Table 1 for three levels.Back to article page