Fig. 2From: Mobile authentication of copy detection patternsExamples of different types of modern PGC with CDP modulationsBack to article page