Fig. 5From: Mobile authentication of copy detection patternsExamples of original and fake codes with symbol size \(5 \times 5\) elements taken by a mobile phone from the Indigo mobile datasetBack to article page