Research Article
Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map
Figure 9
Decrypted watermark images. (a) + 1 × 10−8. (b) − 1 × 10−8. (c) + 2 × 10−8. (d) – 2 × 10−8. (e) + 1 × 10−9. (f) μ + 1 × 10−8. (g) μ – 1 × 10−8. (h) μ + 2 × 10−8. (i) μ – 2 × 10−8. (j) μ + 1 × 10−9.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |