“…These methods are used in critical areas to verify images in fields such as medicine, military, satellite, and forensic. 1,2,17,18 In fragile watermarking methods, a stamp, a logo, or an image can be used as a watermark. Also, a watermark can be generated from hash, chaos, and block information of the cover image.…”