“…Despite the importance of digital images, the ease of tampering with their content has caused a lot of criminal events relevant to confidentiality, integrity, and accessibility of the transmitted images. Therefore, many researchers have developed different approaches for authentication of digital images [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”