Research Article

Blind Photograph Watermarking with Robust Defocus-Based JND Model

Table 3

The BERs of different watermarking methods in combined attacks.

Attack[25][30][32][31][20][18][21][22]Proposed

0.00030.17660.16050.13420.21030.12960.43840.14790.13430.0756
0.00090.22380.23730.22300.32150.16360.45600.23960.22170.1142
0.00030.12010.10070.07400.15560.08580.38470.08030.07090.0198
0.00090.18400.20000.18150.28960.12740.41600.19640.18010.0596
0.00030.12940.11210.08260.17810.10380.42570.08560.07970.0523
0.00090.13600.12120.09300.18530.11060.41690.09560.09030.0641
0.00030.05770.03960.02290.09510.10380.32950.02270.02010.0106
0.00090.06520.05270.03710.10690.06120.35440.03760.03360.0195
0.14890.13960.12160.20590.11680.42870.12680.11300.0962
0.14840.13940.12180.20570.11720.42770.12720.11330.0963
0.08510.07180.06010.13210.07360.32510.06270.05490.0540
0.08580.07230.06020.13220.07410.32520.06450.05530.0541