Research Article
Local Negative Base Transform and Image Scrambling
Figure 10
Watermarking experiment based on LNBT and LSB: (a) original image; (b) watermarked image; (c) watermark image, (d), (f), (h), and (j) attacked images by cropping; (e), (g), (j), and (k) watermarks extracted from the attacked watermarked images.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |