Research Article
Embedding Guided End-to-End Framework for Robust Image Watermarking
Figure 10
Comparison with other algorithms under different attacks with different levels: (a)Gaussian blur; (b)JPEG compression; (c)crop; (d)dropout.
(a) |
(b) |
(c) |
(d) |