Research Article

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing

Figure 2

(a) Original image; (b) encrypted image; (c) encrypted image containing watermark; (d) reconstructed image; (e) decrypted image.
(a)
(b)
(c)
(d)
(e)