Research Article

Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map

Table 4

Attack types and descriptions.

IndexDescription of the attack

1Attack free
2Salt and pepper noise with a noise density of 0.01
3Salt and pepper noise with a noise density of 0.1
4Salt and pepper noise with a noise density of 0.3
5Gaussian noise with a variance of 0.01
6Gaussian noise with a variance of 0.1
7Gaussian noise with a variance of 0.3
8Speckle noise with a variance of 0.05
9Speckle noise with a variance of 0.1
10Speckle noise with a variance of 0.3
11Cropping 25% rows
12Cropping 50% rows
13Counter-clockwise rotation by 45°
14Counter-clockwise rotation by 60°
15JPEG compression with a quality factor of 80
16JPEG compression with a quality factor of 60
17Median filtering with a window size of 3 × 3
18Median filtering with a window size of 5 × 5
19Average filtering with a window size of 3 × 3
20Average filtering with a window size of 5 × 5
21Sharpening
22Brightening by 50%
23Darkening by 30%
24Histogram equalization