“…The second group consists of selective authentication methods which tolerate selected operations on images, such as compression, various filtering algorithms, or the application of geometric transformations to images. Within the second group, semi-fragile watermarking methods have been applied, such as the Inner-Outer Block-Based method [7] which splits the image into an inner and an outer part. This division has the purpose of copyright protection in addition to authentication.…”