Fig. 8From: Fragile watermarking based on incomplete cryptography for copyright protectionExperimental results of ADCT method (a1–c4)Back to article page