Security and Communication Networks / 2018 / Article / Tab 5

Research Article

A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients

Table 5

BER(%) comparison with [26] using a message length of 128 bits.

Attack Method Barbara Mandrill Map Couple Bridge

JPEG (10)[26]5,47005,476,2521,880014,0600
Proposed0,0078000,12500,0078

JPEG (20)[26]0,78002,3405,47003,1300
Proposed0000,00780,0078

JPEG (30)[26]0003,91000,7800
Proposed00000

JPEG (40)[26]0002,34000
Proposed00000

JPEG (50)[26]00000
Proposed00000

JPEG (60)[26]00000
Proposed00000

JPEG (70)[26]00000
Proposed00000

JPEG (80)[26]00000
Proposed00000

JPEG (90)[26]00000
Proposed00000

Scaling (0,75)[26]00000
Proposed00000

Scaling (0,8)[26]01,50000
Proposed0000,00780

Scaling (0,9)[26]00000
Proposed00000

Scaling (1,1)[26]02,340,7801,5600
Proposed0000,03120,0078

Scaling (1,5)[26]00000
Proposed00000

Scaling [26]00000
Proposed00000

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.