Fig. 14From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityBlock diagram of (a) watermark embedding and (b) extraction process for Cao et al.’s method [7]Back to article page