Research Article

Embedding Guided End-to-End Framework for Robust Image Watermarking

Table 6

Comparison with other algorithms against the attack types different from those in the training stage.

AlgorithmsResizing (T = 2)Medium blur (ω = 3)Salt and pepper noise (p = 0.2)Gaussian noise (σ = 1.0)

Luo [37]27.9729.4830.1529.75
Ding [38]26.6428.5729.3128.43
Baluja [39]28.8930.3231.6730.46
Ours32.8733.9134.0233.52