Research Article
Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map
Table 4
Attack types and descriptions.
| Index | Description of the attack |
| 1 | Attack free | 2 | Salt and pepper noise with a noise density of 0.01 | 3 | Salt and pepper noise with a noise density of 0.1 | 4 | Salt and pepper noise with a noise density of 0.3 | 5 | Gaussian noise with a variance of 0.01 | 6 | Gaussian noise with a variance of 0.1 | 7 | Gaussian noise with a variance of 0.3 | 8 | Speckle noise with a variance of 0.05 | 9 | Speckle noise with a variance of 0.1 | 10 | Speckle noise with a variance of 0.3 | 11 | Cropping 25% rows | 12 | Cropping 50% rows | 13 | Counter-clockwise rotation by 45° | 14 | Counter-clockwise rotation by 60° | 15 | JPEG compression with a quality factor of 80 | 16 | JPEG compression with a quality factor of 60 | 17 | Median filtering with a window size of 3 × 3 | 18 | Median filtering with a window size of 5 × 5 | 19 | Average filtering with a window size of 3 × 3 | 20 | Average filtering with a window size of 5 × 5 | 21 | Sharpening | 22 | Brightening by 50% | 23 | Darkening by 30% | 24 | Histogram equalization |
|
|