Fig. 6From: Secure and efficient DRM watermark algorithm of forensics in mobile internetFlow of watermark embed schemeBack to article page