Fig. 9From: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capabilityExample of detecting tamper hierarchically [50]. a The watermarked beach. b Tampered beach. c, e, g Detected erroneous regions of level 1, level 2 and level 3 respectively. d, f, h Recovered beaches of level 1, level 2 and level 3 respectivelyBack to article page