Fig. 7From: A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptographyNo attack: a Original watermark, b Encrypted watermark, c Ownership share, d Identification share, e Superimposed share, f Superimposed share after reduction and g Extracted watermarkBack to article page