Fig. 7From: Fragile watermarking based on incomplete cryptography for copyright protection a, b Experimental Q-table methodBack to article page