Skip to main content
. 2021 Jan 7;34(1):204–211. doi: 10.1007/s10278-020-00396-0

Fig. 5.

Fig. 5

Attacking the security of zero-watermarking methods by modifying the watermarked image