Fig. 12From: Secure and efficient DRM watermark algorithm of forensics in mobile internetSimulation resultsBack to article page