Fig. 6From: A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptographyComparison of different methods: a Gaussian noise, b Blurring, c Sharpening and d Gamma correction attacksBack to article page