论文部分内容阅读
Two watermarks are embedded into the original image. One is the authentication water- mark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery waterma