Fig. 2From: Secure self-recovery watermarking scheme for error concealment and tampering detectionCombinatorial dispersed dot patterns: a 2-bit dispersed dot patterns used for mapping four intensity levels and b 3-bit dispersed dot patterns used for mapping eight intensity levelsBack to article page