Fig. 10From: Secure and efficient DRM watermark algorithm of forensics in mobile internetWatermark attacking and detectingBack to article page