Research Article

Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands

Figure 6

An example of the results from processing a number of steps: (a) original image, (b) watermarked image, (c) attacked image, and (d) extracted final watermark.
(a)
(b)
(c)
(d)