Fig. 4From: Secure self-recovery watermarking scheme for error concealment and tampering detectionBlock diagram of the inverse halftoning algorithmBack to article page