Fig. 7From: Non-integer expansion embedding techniques for reversible image watermarkingComparison of capacity and fidelity against three typical algorithms [14,15,18]Back to article page