Fig. 2From: Semi-structured data protection scheme based on robust watermarkingOverview of the embedding and extraction procedureBack to article page