Research Article

Robust and Fragile Medical Image Watermarking: A Joint Venture of Coding and Chaos Theories

Table 9

Received hash after various attacks.

Attack typeAttack parameterRecovered hash

Salt and pepper noiseVariance 0.02a16c4d382706e5a92f838ea64254c83a
Variance 0.0382706e5a9254cf838ea642a16c4d383a
Variance 0.05f86e5a9254c8338ea642a16c4d38270a
Variance 0.2d382706e5a838ea642a16c492f54c83a

Speckle noiseVariance 0.02834d3827f068ea642a16ce5a9254c83a
Variance 0.03f38ea642a54c8316c4d8382706e5a92a
Variance 0.058ea642a16c4d38270f836e5a9254c83a
Variance 0.2f83d83382706e5a9254c8ea642a16c4a

Gaussian noiseVariance 0.02ea5a9254c8642a16c4d382706f838e3a
Variance 0.05fa16c4d382706e5838ea642a9254c83a

Median filteringWindow size 3 × 38ea642a16c4d382f83706e5a9254c83a
Window size 5 × 5f8 ea642a16c4d38382706e5a9254c83a
Window size 7 × 7f8c454c83d382706e5a9238ea642a16a

Tampering9 bitsf838ea69254ca16c4d382706e5a83abb
18 bitsf42a16c4d3829838ea6706e5a254bab01

Rotation2 degrees8a642a16c4d382f83706e5a9e254c83a
8 degreesfc4d38382706e5a9254c838ea642a16a