Research Article

Blind Photograph Watermarking with Robust Defocus-Based JND Model

Table 1

The BERs of different watermarking methods for individual attacks in photograph Flower1.

Attack[25][30][32][31][20][18][21][22]Proposed

GN0.00030.04590.02540.01070.14160.02830.01560.00680.00490.0010
0.00090.10450.10060.08200.27540.06740.10160.10060.07710.0078
0.00150.15530.17480.16800.29880.09770.16330.18360.15140.0166
S&P noise0.00090.02930.02540.02640.02540.03520.02030.02440.02640.0029
0.00120.03710.03130.03220.03320.04100.03220.03610.03320.0098
0.00150.04980.03910.04100.04590.04490.03960.04100.04100.0156
JPEG800.02340.00490.00290.03910.02150.092600.00200.0010
600.03610.01660.00490.07130.04100.42260.00780.00680.0020
400.08110.05860.04390.12990.08200.48190.05860.04490.0225
Scaling0.50.08890.21680.28520.10350.02050.000500.00100.0166
1.10.00980.00490.00200.01370.01860.0005000
Central crop0.01860.00680.00490.01070.02640.02400.00390.00490.0020
0.02930.01560.01560.01860.03220.02830.01320.01270.0049
GF0.01270.01950.01460.03220.03610.00320.01660.00880.0107