Fig. 16From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityBlock diagram of (a) watermark embedding and (b) extraction process for Qin et al.’s method [48]Back to article page