Fig. 4
From: Secure self-recovery watermarking scheme for error concealment and tampering detection

Block diagram of the inverse halftoning algorithm
From: Secure self-recovery watermarking scheme for error concealment and tampering detection
Block diagram of the inverse halftoning algorithm