Fig. 7From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilitySecond authentication bit generation of Singh’s scheme [1]Back to article page