Fig. 19From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityPerformance comparison on average PSNR of three images versus tamper cropping attacks percentageBack to article page