Fig 1.
Impression drawing after different Arnold transform times.
Fig 2.
Schematic pictures of three-level discrete wavelet decomposition.
Fig 3.
Execute process of differential evolution algorithm.
Fig 4.
Flowchart of watermark embedding and extraction processes.
Fig 5.
Images of watermarking embedding and extraction.
Table 1.
List of various attacking operations and their parameter values.
Table 2.
PSNR values of the original image and the watermarked image.
Fig 6.
Watermarked images under various attacks.
Fig 7.
Extracted watermark images from distorted watermarked images.
Fig 8.
Comparison of algorithm in term of NC values.
Fig 9.
NC Values of watermark image under different attack operations.