Fig. 8From: An intermediate significant bit (ISB) watermarking technique using neural networksNCC value for the LSB method under different types of attackBack to article page