... about the complete look of the new product and thus cannot leak the information to a competitor. On the other hand, if one of the four members is absent in the team meeting, then the region held ... the corresponding block of the remaining nregions (one share per region). To simplify the embedding, the concatenation operation is used to combine these n indexshares and the authentication ... detection, loca-tion, and recovery. They used parity check and comparisonto generate the authentication watermark of each block, and then added the recovery information, which recorded the six...