Research Article
A Robust Time Efficient Watermarking Technique for Stereo Images
Table 5
JPEG compression attacks.
(a) |
| Watermarked images before and after compression | Before compression | | 192 KB | After compression | | 17.3 KB |
|
|
|
(b) |
| Left and right images for compressed image |
| Left and right images | | |
| Extracted watermark using proposed method | | |
| Extracted watermark [4] | Failed | Failed |
|
|