Fig. 4From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityBlock diagram of the embedding procedure of Singh et al. [37], segmented block size modification-based fragile watermarkingBack to article page