Watermarking approach | Watermark generation | Segmented block size (pixels) | Embedding technique | Watermark payload (bpp) | PSNR water-marked image (dB) | Attacks | PSNR of restored images (dB) |
---|---|---|---|---|---|---|---|
[41]Han 2013 | Dual watermarking scheme: Fragile: LSB, robust: DWT | 2 × 2 | LSB and DWT | 2 | N. A | General attack | N. A |
[4] Chamlawi 2009 | Recovery: image digest using the Huffman coding on IDCT coefficients | N. A | IDCT and IWT | N. A | 38–44 | Malicious and incidental attacks | NA |
[54] Zhang 2018 | Mean value of each overlapping | 2X2 | DWT | 1–2 | 22–24 | Cropping attacks | 27–36 |
[55] Xin 2016 | NA | 8 × 8 | DWT | N.A | 44 dB | Malicious attacks | 30 dB |