Fig. 18From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityExample of the 20% tampered Airplane image with cropped image of four schemes. (a1–a4) Scheme [1]; (b1–b4) scheme [7]; (c1–c4) scheme [24]; (d1–d4) scheme [48]. First column: Airplane original images, second column: tampered images, third column: tamper detection, fourth column: tamper recoveryBack to article page