Research Article
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands
Figure 6
An example of the results from processing a number of steps: (a) original image, (b) watermarked image, (c) attacked image, and (d) extracted final watermark.
(a) |
(b) |
(c) |
(d) |