Fig. 1From: Secure and efficient DRM watermark algorithm of forensics in mobile internetDCT transformBack to article page