Research Article
Destroy the Robust Commercial Watermark via Deep Convolutional Encoder-Decoder Network
Table 1
Strength of watermark extracted after different methods of attack.
| Test images | | | | |
| Proposed method | None | None | None | None | Wang et al. [26] | None | None | None | None | StirMark | Cropping | | Weak | Medium | Medium | Medium | | Very weak | Weak | Weak | Weak | | None | None | None | None | Rotation | | Medium | Medium | Medium | Medium | | Medium | Medium | Medium | Medium | | Medium | Medium | Medium | Medium | Scaling | | Weak | Weak | Weak | Weak | | Medium | Strong | Strong | Strong | | Medium | Medium | Medium | Medium |
|
|