Research Article

Embedding Guided End-to-End Framework for Robust Image Watermarking

Table 3

Performance comparison between the proposed model without and with an attacking simulator.

Attacking simulatorEncoded imageExtracted watermark
PSNRSSIMPSNRSSIM

Without41.020.991324.120.7824
With40.690.990438.190.9722