Research Article

Multiplicative Watermarking Method with the Visual Saliency Model Using Contourlet Transform

Table 2

BER (%) results of various watermarking methods under common attacks.

ImageMethodsGaus.noi. 20Salt.Pep.0.05JPEG 20%Gau.filt. 3 x 3Med.filt. 3 x 3

LenaMethod [27]3.023.435.63
Method [31]2.4113.789.241.191.56
Method [38]6.2920.761.834.95
Proposed2.2511.244.832.863.72

BarbaraMethod [27]2.563.952.14
Method [31]1.8910.268.300.821.65
Method [38]7.3418.851.495.36
Proposed2.085.232.351.732.20

BridgeMethod [27]2.949.446.79
Method [31]3.8112.508.962.492.16
Method [38]6.9319.501.685.18
Proposed2.599.692.613.805.43

BoatMethod [27]3.1210.175.29
Method [31]4.9314.987.421.853.26
Method [38]6.6818.201.565.64
Proposed2.3412.052.582.236.69

ElaineMethod [27]2.5913.303.68
Method [31]2.0815.195.892.794.92
Method [38]6.3417.352.765.54
Proposed2.1314.580.872.556.80

MandrillMethod [27]1.784.873.22
Method [31]2.3410.486.451.382.64
Method [38]5.9518.291.825.97
Proposed1.827.671.332.194.50

PeppersMethod [27]5.7012.796.86
Method [31]4.4815.245.532.641.75
Method [38]8.6019.421.766.08
Proposed4.2712.872.732.391.44

ManMethod [27]4.3913.028.46
Method [31]3.6610.8211.254.896.88
Method [38]7.0822.072.105.83
Proposed2.4511.774.944.755.32