Research Article

Blind Photograph Watermarking with Robust Defocus-Based JND Model

Table 5

The BERs of different watermarking methods in combined attacks.

Attack[25][30][32][31].[20][18][21][22]Proposed

0.00030.14490.13090.10840.19590.11200.41310.11820.09990.0616
0.00090.18960.20510.19040.26550.13780.42240.20180.18310.1196
0.00030.09970.08530.05800.14220.07380.32320.06160.05420.0214
0.00090.15480.17830.15410.24020.10900.34910.16690.14750.0719
0.00030.11800.08360.05900.23670.09290.38090.06500.05630.0471
0.00090.12430.09350.06910.24190.09630.38920.07500.06540.0625
0.00030.05330.03140.01840.14380.04770.29350.01640.01390.0143
0.00090.06010.04330.02980.15370.05370.30320.02770.02600.0303
0.13830.12240.10180.27370.11310.38130.10960.09290.0916
0.13880.12180.10160.27380.11330.38280.10990.09310.0922
0.08220.06910.06250.19810.07730.30810.06840.05570.0544
0.08250.06960.06320.19890.07750.31010.06930.05660.0551