Fig. 2From: Applying cheating identifiable secret sharing scheme in multimedia securitySeven shadows on the secret imageBack to article page