Fig. 9From: Secure and efficient DRM watermark algorithm of forensics in mobile internetWatermark embedding and extractingBack to article page