Fig. 5From: Robust watermark technique using masking and Hermite transformEmbedded image Pirate, using: a binary mask, b perceptive maskBack to article page