“…Then many fragile watermarking algorithms have been proposed in literature (cfr., for example, [1,3,4,5,9,13,15,16,17,24,28]). The insertion of the watermark, the tamper detection and the tamper localization are the three procedures which compose a fragile watermark and below described.…”