Skip to main content
Fig. 13 | Journal of the Brazilian Computer Society

Fig. 13

From: Secure self-recovery watermarking scheme for error concealment and tampering detection

Fig. 13

Identification and restoration of tampered regions in the “Train ticket,” “Lena,” and “Passport” images attacked using “cut-and-paste,” “crop and blur,” and “cropping” attacks, respectively. From left to right: a original, b tampered, c regions identified as tampered, d restored regions, e unauthorized recovered mark, f restored image

Back to article page