Research Article

Blind Photograph Watermarking with Robust Defocus-Based JND Model

Table 4

The BERs of different watermarking methods in individual attacks.

Attack[25][30][32][31][20][18][21][22]Proposed

GN0.00030.07100.05140.02910.12120.04990.08640.03160.02360.0070
0.00090.14440.15890.13270.22110.09010.11380.14290.12810.0314
0.00150.18730.22740.20810.26230.12330.14940.22350.20470.0651
S&P noise0.00090.02430.03140.02050.03160.03010.07960.02100.02200.0118
0.00120.03050.04000.02930.03990.03560.10350.02990.03130.0186
0.00150.03930.04860.03810.04910.04070.13090.03740.03970.0242
JPEG800.02670.01560.00400.09070.02990.19480.00130.00070.0060
600.07130.04740.02400.19300.06500.34380.02540.02120.0187
400.14920.12940.09900.30210.11900.39310.10770.10010.0891
Scaling0.50.09840.21880.28870.14530.01950.077100.00020.0188
1.10.01010.02000.01120.03700.02200.07910.00330.00220.0059
Central crop0.01450.01980.00630.01480.02020.07710.00390.00350.0067
0.02310.02050.01330.02150.02400.07760.01070.01060.0050
GF0.04610.05710.04960.14220.05260.11360.05190.04200.0428