Fig. 8From: Secure and efficient DRM watermark algorithm of forensics in mobile internetPSNR for different kBack to article page