Fig. 5From: Secure self-recovery watermarking scheme for error concealment and tampering detectionBlock diagram of error concealment algorithm for videosBack to article page