Research Article

A Novel Comprehensive Watermarking Scheme for Color Images

Algorithm 5

Extracting fragile watermark.
(1)Step 1: divide the attacked image into nonoverlapping small pieces of .
(2)  Step 2: use the layer R and the layer G to generate the hash sequence.
(3)Step 3: extract the stored watermark sequence from the layer B using the LSB algorithm and compared with the generated sequence by step 2 [20].
(4)Step 4: repeat steps 2-3 until the full picture is traversed. If the comparison is successful, no action is taken; otherwise, it is marked on the image.