Figure 8.

Forward and inverse wavelet transform and watermark embedding.

Caldelli et al. EURASIP Journal on Information Security 2010 2010:134546   doi:10.1155/2010/134546