Avoiding weak parameters in secret image sharing | IEEE Conference Publication | IEEE Xplore