A Novel Comprehensive Watermarking Scheme for Color Images
Algorithm 5
Extracting fragile watermark.
(1)
Step 1: divide the attacked image into nonoverlapping small pieces of .
(2) Step 2: use the layer R and the layer G to generate the hash sequence.
(3)
Step 3: extract the stored watermark sequence from the layer B using the LSB algorithm and compared with the generated sequence by step 2 [20].
(4)
Step 4: repeat steps 2-3 until the full picture is traversed. If the comparison is successful, no action is taken; otherwise, it is marked on the image.