Fig. 4From: Mobile authentication of copy detection patternsThe schematic representation of the mobile phone acquisition setupBack to article page