Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Figure 5

The retrieved picture (a), embedded picture (b), and the original picture (c).
(a)
(b)
(c)