Figure 5: Security evaluation about the faked watermarks.

Back to Article