Fig. 10From: Fragile watermarking based on incomplete cryptography for copyright protectionExperimental results of WQBT method (a1–c4)Back to article page