From: A New Robust Watermarking Scheme to Increase Image Security
Attack type | Proposed method | Mohanty method [24] | Asatryan method [27] |
---|---|---|---|
Attack-free | 0/2500 | 0/2500 | 0/2500 |
Blurring (2,3) | 2/2500 | 2/2500 | 2/2500 |
Sharpening(1) | 3/2500 | 4/2500 | 1/2500 |
Median Filter (, ) | 0/2500 | 3/2500 | 5/2500 |
Gaussian Noise (0.001, 0.002) | 3/2500 | 3/2500 | 2/2500 |
Gaussian Low Pass Filter (, ) | 0/2500 | 0/2500 | 1/2500 |
Cropping (40%, 50%, 60%) | 1/2500 | 20/2500 | 1/2500 |
Scaling (1/2, 1/4) | 2/2500 | 3/2500 | 7/2500 |
JEPG Compression (10,20,30,40) | 3/2500 | 6/2500 | 1/2500 |
Tampering | 0/2500 | 8/2500 | 2/2500 |
Data Block Removal | 0/2500 | 5/2500 | 1/2500 |
Composite Attack | 3/2500 | 13/2500 | 21/2500 |
Total | 16 | 67 | 44 |