Fig. 1From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityA brief overview of self-embedding watermarking for image authenticationBack to article page