Research Article
A Novel Comprehensive Watermarking Scheme for Color Images
Figure 9
The result of filtering attacks: (a) the comparison of extracted watermarks after filtering attack and (b) the comparison of extracted watermarks after filtering attack.
(a) |
(b) |