Research Article
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Figure 2
(a) Original image; (b) encrypted image; (c) encrypted image containing watermark; (d) reconstructed image; (e) decrypted image.
(a) |
(b) |
(c) |
(d) |
(e) |