Skip to main content

Table 6 Comparison of robustness (BCR) against image processing attacks between Feng et al. [13], Lin et al. [25], the DCT-only, and the DWT-DCT methods

From: Blind image watermarking technique based on differential embedding in DWT and DCT domains

Attack

Method

 

Feng et al. [13]

Lin et al. [25]

DCT-only

DWT-DCT

Bit-plane

96.3

85.9

100

100

removal (5 bits)

    

Gamma

99.2

76.1

100

100

correction (3)

    

Gaussian

87.5

79.5

96.3

94.9

noise (0.01)

    

Histogram

99.3

94.5

100

100

equalization

    

Laplacian

100

91.4

100

100

sharpening

    

Median

97.1

99.2

41.6

100

filter (3 ×3)

    

Gaussian

98.8

94.5

83.4

100

filter (5 ×5)

    

Salt and pepper

93.3

85.9

99.1

98.3

noise (0.02)