Figure 2From: Time-Frequency and Time-Scale-Based Fragile Watermarking Methods for Image Authentication The original unwatermarked image used in the analysis. Back to article page