Fig. 8From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityThe (8,1) local binary pattern used in Chang’s [3] scheme [3]Back to article page