Fig. 2
From: Secure self-recovery watermarking scheme for error concealment and tampering detection

Combinatorial dispersed dot patterns: a 2-bit dispersed dot patterns used for mapping four intensity levels and b 3-bit dispersed dot patterns used for mapping eight intensity levels