In this chapter, the authors give a survey about self-embedding watermarking, which enables not only detection of tampered regions but also recovering the damaged information. They introduce the pioneering method as well as the representative schemes, including adjacent-block detection, hierarchical detection and self-recovery, dual watermarks, reference sharing, and flexible self-recovery. The authors analyze the distinguishing features and loopholes by considering four key techniques, namely the secure block-mapping function, the unambiguous authentication, the reference information extraction, and the watermark embedding approaches. They make comparative studies on the above works and then outline further research directions and a conclusion.