Research Article

Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map

Table 6

NC values for attacks on watermarked images.

AttacksLenaBaboonBoatCouplePepperLakeManHouseTowerSea

11111111111
20.99960.99960.99950.99960.99960.99960.99960.99960.99960.9995
30.99940.99940.99940.99940.99940.99940.99940.99940.99940.9994
40.99940.99940.99940.99940.99940.99940.99940.99940.99940.9994
50.99950.99950.99950.99950.99950.99950.99950.99950.99950.9995
60.99940.99940.99940.99940.99940.99940.99940.99940.99940.9994
70.99940.99940.99940.99940.99940.99940.99940.99940.99940.9994
80.99970.99970.99970.99970.99980.99970.99980.99960.99970.9996
90.99960.99960.99960.99960.99960.99960.99960.99960.99950.9995
100.99940.99940.99940.99940.99940.99940.99940.99940.99940.9994
110.98770.92850.99610.99330.97500.97690.90300.97000.99080.9926
120.88850.94360.85760.83400.92240.87870.94120.88640.98000.9858
130.99110.98460.99860.99890.97670.98040.99360.99340.99460.9867
140.98820.98030.99880.99930.97430.96690.98770.99290.99540.9941
150.92450.97070.93590.92420.90370.83820.97630.99450.98610.9587
160.79640.92930.85360.72310.79480.85570.82980.98670.97070.9278
170.94180.90540.96220.90800.86290.91230.87560.96040.91460.9540
180.85080.82170.87580.82610.80400.82770.80930.85940.84230.8699
290.98250.95290.98800.96410.92450.92930.94390.98740.94610.9865
200.97140.92920.81420.94500.89330.87690.90970.81580.91210.9796
210.99920.99890.99910.99930.99930.98980.99930.99930.99930.9991
220.99970.99960.99970.99970.99970.99970.99970.99960.99940.9946
230.97880.96460.98250.97310.97070.95970.96910.98220.96540.9811
240.99960.99940.99950.99950.99960.99910.99960.99920.99970.9977