Research Article

Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map

Figure 9

Decrypted watermark images. (a)  + 1 × 10−8. (b)  − 1 × 10−8. (c)  + 2 × 10−8. (d)  – 2 × 10−8. (e)  + 1 × 10−9. (f) μ + 1 × 10−8. (g) μ – 1 × 10−8. (h) μ + 2 × 10−8. (i) μ – 2 × 10−8. (j) μ + 1 × 10−9.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)