Fig. 2From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityBlock diagram of watermark embedding processBack to article page