Fig. 2From: Fragile watermarking based on incomplete cryptography for copyright protectionDRM system based on incomplete cryptography (a, b)Back to article page