Research Article
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras
Figure 10
Attacked visible watermarked artificial images (Figure 5(a)), generated by [13, 14] and proposed algorithm. ((a)–(c)) Compressed watermarked images by JPEG standard, ((d)–(f)) high contrast, ((g)–(i)) low contrast, ((j)–(l)) Gaussian low-pass filter, ((m)–(o)) high illumination, ((p)–(r)) low illumination, and ((s)–(u)) Gaussian noise contamination.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |
(q) |
(r) |
(s) |
(t) |
(u) |