Fig. 11From: Secure self-recovery watermarking scheme for error concealment and tampering detectionFrom top to bottom: a, b original frames, c, d restored using the default H.264 error concealment algorithm, and e, f restored using the proposed algorithmBack to article page