Fig. 7From: Secure and efficient DRM watermark algorithm of forensics in mobile internetThe masking characteristic of ImageBack to article page