Skip to main content

Table 5 Comparison of robustness (BCR) against image compression attacks between Feng et al. [13], Lin et al. [25], the DCT-only, and the DWT-DCT methods

From: Blind image watermarking technique based on differential embedding in DWT and DCT domains

Attack

Method

 

Feng et al. [13]

Lin et al. [25]

DCT-only

DWT-DCT

JPEG 2000

79.8

97.2

86.8

90.2

(R = 0.02)

    

JPEG 2000

92.2

98.8

100

99.6

(R = 0.03)

    

JPEG 2000

98.4

100

100

100

(R = 0.04)

    

JPEG lossy

89.2

100

74.9

100

(Q = 40)

    

JPEG lossy

78.4

98.4

68.7

99.4

(Q = 30)

    

JPEG lossy

69.8

94.5

61.4

88.8

(Q = 20)