Research Article

Embedding Guided End-to-End Framework for Robust Image Watermarking

Table 1

Review of different deep learning-based watermarking algorithms.

ImprovementsReferencesTechniquesAttacksCapacity

Attacking simulationZhu [11]The first work to simulate attacks by inserting the noise layersCrop, Gaussian, dropout, and JPEG90 bits
Mellimi [12]Simulation of noise layers against agnostic attacksJPEG, noise, and noise1024 bits
Ahmadi [13]Simulation of noise layers to resist mixture attacksCrop, Gaussian, resize, and JPEG1024 bits
Chen [14]Simulation of differentiable JPEG quantizationJPEG1024 bits
Jia [15]Combination of simulated and real JPEG in noise layerJPEG, crop, and Gaussian1024 bits
Ying [16]Training a network to simulate JPEG compressionJPEG, scaling, and GaussianA whole image
Model architecture designDhaya [17]Lightweight CNN schemeJPEG, Gaussian, and median512 bits
Fang [18]U-net architectureTransparency, JPEG, and crop128 bits
Cun [19]Combination of SplitNet and RefineNetCrop and colorA whole image
Mun [20]Attention mechanismJPEG, crop, filtering, and noise512 bits
Yu [21]Generative adversarial network with attention maskNoise, crop, and shiftA whole image
Hao [22]Generative adversarial network with a high-pass filterCrop, Gaussian, and flip30 bits
Li [23]Generative adversarial network with perceptual lossesNoise, filtering, and sharpen1024 bits