Fig. 6From: Secure self-recovery watermarking scheme for error concealment and tampering detectionBlock diagram of tampering detection algorithmBack to article page