Fig. 10From: Secure self-recovery watermarking scheme for error concealment and tampering detectionConcealed results using different methods and their respective map of attacks for “pill” imageBack to article page