Table 8 Comparison of entropy based adaptive watermarking schemes.
From: An adaptive robust watermarking scheme based on chaotic mapping
Watermark scheme | Proposed | ||||
---|---|---|---|---|---|
Method | DWT-WHT-SVD | LWT | DWT | DWT | DWT-HD-SVD |
Cover image | 512\(\times \)512 color | 512\(\times \)512 color | 512\(\times \)512 color | 512\(\times \)512 gray | 512\(\times \)512 color |
Watermark image | 64\(\times \)64 gray | 64\(\times \)64 gray | 64\(\times \)64 gray | 256\(\times \)256 gray | 256\(\times \)256 gray |
PSNR | 40.0876 | 44.6506 | 51.6145 | 28.65913 | 45.3437 |
SSIM | 0.9883 | 0.9959 | 0.9992 | – | 0.9987 |
Advantage | High robustness low cost | High robustness low cost | High robustness low cost | High concealment | High robustness high security |
Inferiority | Poor robustness of median filtering attack | Poor robustness of median filtering attack | – | Poor robustness | Poor robustness of rotation attack |
Security technology | Arnold Transform | Arnold Transform | – | Arnold Transform | Logistic map |
Embedding capacity | 0.04166 | 0.04166 | 0.04166 | 0.6667 | 0.6667 |