It appears the same diagram is used in Alberto Grand's 'Block Cipher Modes of Operation and the CMAC Mode for Authentication'. Should credit be given?