Figure 3From: Digital image watermarking: its formal model, fundamental properties and possible attacks Deploying keys in the detection function of our basic model. Back to article page