Research Article

Embedding Guided End-to-End Framework for Robust Image Watermarking

Table 5

Comparison of robustness against different types of attacks.

AttacksAlgorithmsEncoded imageExtracted watermark
PSNRSSIMLogoMNISTImageNet
PSNRSSIMPSNRSSIMPSNRSSIM

Gaussian blur (ω = 9)Luo [39]33.790.921331.490.910932.760.926730.380.9015
Ding [40]32.560.914630.240.893731.950.908628.890.8812
Baluja [41]34.240.932232.620.914833.970.927531.040.9068
Ours41.110.975136.240.964137.870.975334.920.9549
JPEG compression (QF = 60)Luo [39]33.080.922530.370.902131.430.907829.120.8994
Ding [40]32.670.911429.730.886430.820.902628.230.8801
Baluja [41]34.490.951131.390.911532.740.924830.590.9082
Ours38.350.965734.170.951235.860.957333.110.9448
Crop (p = 0.4)Luo [39]32.930.932531.370.912132.660.926430.250.9027
Ding [40]32.200.900730.880.896432.050.912830.080.8901
Baluja [41]34.360.946132.590.932333.740.945631.230.9119
Ours39.450.972737.060.960538.850.977336.390.9597
Dropout (p = 0.45)Luo [39]34.160.932132.450.940933.760.948731.070.9339
Ding [40]32.640.914530.360.904731.830.910229.990.8995
Baluja [41]33.970.934332.820.922233.750.929832.010.9186
Ours39.180.971035.640.958636.830.964234.750.9503
CombinedLuo [39]32.170.918930.010.883230.950.904528.670.8974
Ding [40]31.010.901328.470.881331.080.894227.840.8757
Baluja [41]33.120.938730.960.910231.890.921130.220.9032
Ours37.640.972434.110.950535.790.956834.680.9501