Figure 5: Security evaluation about the faked watermarks.
Back to Article