Research Article
Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map
Figure 9
Decrypted watermark images. (a) + 1 × 10−8. (b) − 1 × 10−8. (c) + 2 × 10−8. (d) – 2 × 10−8. (e) + 1 × 10−9. (f) μ + 1 × 10−8. (g) μ – 1 × 10−8. (h) μ + 2 × 10−8. (i) μ – 2 × 10−8. (j) μ + 1 × 10−9.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |
| (i) |
| (j) |