Research Article

Multiplicative Watermarking Method with the Visual Saliency Model Using Contourlet Transform

Table 3

BER (%) results of various watermarking methods under geometric attacks.

ImageMethodsRot.10°Scal. 0.75Crop.50%Rot.5 + Scal .5

LenaMethod [27]10.2227.3429.4530.24
Method [31]12.7622.0826.1729.46
Method [38]17.4920.8922.3234.58
Proposed9.6819.9720.8021.73

BarbaraMethod [27]9.3432.2930.1328.71
Method [31]11.9227.4426.4925.82
Method [38]18.2424.1225.6937.61
Proposed6.6026.8016.3220.94

BridgeMethod [27]7.389.6532.7431.18
Method [31]17.8219.5425.5824.19
Method [38]19.2323.4727.4839.69
Proposed9.5616.8924.2223.71

BoatMethod [27]9.5118.3628.6728.40
Method [31]8.8424.0720.3429.33
Method [38]15.0228.7326.8538.87
Proposed5.9725.9922.7622.25

ElaineMethod [27]11.3521.4327.5027.42
Method [31]16.2428.3019.3825.78
Method [38]20.4335.6621.8035.93
Proposed10.3330.1216.1425.39

MandrillMethod [27]8.9812.4624.5527.16
Method [31]7.2220.7920.1824.23
Method [38]22.0629.7824.5736.94
Proposed6.5017.4312.8419.59

PeppersMethod [27]12.4523.7829.4329.68
Method [31]13.3918.7621.8030.49
Method [38]18.8727.2623.1838.68
Proposed6.0719.5913.6723.67

ManMethod [27]9.9414.4127.8627.45
Method [31]10.1821.7819.4422.97
Method [38]21.5026.1523.0736.34
Proposed7.8320.4210.2921.80