Fig. 2
From: Semi-structured data protection scheme based on robust watermarking

Overview of the embedding and extraction procedure
From: Semi-structured data protection scheme based on robust watermarking
Overview of the embedding and extraction procedure