Fig. 5From: Semi-structured data protection scheme based on robust watermarkingFlowchart of watermark extractionBack to article page