Table 8 Comparison of entropy based adaptive watermarking schemes.

From: An adaptive robust watermarking scheme based on chaotic mapping

Watermark scheme

42

41

44

45

Proposed

Method

DWT-WHT-SVD

LWT

DWT

DWT

DWT-HD-SVD

Cover image

512\(\times \)512 color

512\(\times \)512 color

512\(\times \)512 color

512\(\times \)512 gray

512\(\times \)512 color

Watermark image

64\(\times \)64 gray

64\(\times \)64 gray

64\(\times \)64 gray

256\(\times \)256 gray

256\(\times \)256 gray

PSNR

40.0876

44.6506

51.6145

28.65913

45.3437

SSIM

0.9883

0.9959

0.9992

–

0.9987

Advantage

High robustness low cost

High robustness low cost

High robustness low cost

High concealment

High robustness high security

Inferiority

Poor robustness of median filtering attack

Poor robustness of median filtering attack

–

Poor robustness

Poor robustness of rotation attack

Security technology

Arnold Transform

Arnold Transform

–

Arnold Transform

Logistic map

Embedding capacity

0.04166

0.04166

0.04166

0.6667

0.6667