Fig. 11From: Secure and efficient DRM watermark algorithm of forensics in mobile internetDifferent mobile pictures with watermarksBack to article page