Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

Impression drawing after different Arnold transform times.

More »

Fig 1 Expand

Fig 2.

Schematic pictures of three-level discrete wavelet decomposition.

More »

Fig 2 Expand

Fig 3.

Execute process of differential evolution algorithm.

More »

Fig 3 Expand

Fig 4.

Flowchart of watermark embedding and extraction processes.

More »

Fig 4 Expand

Fig 5.

Images of watermarking embedding and extraction.

More »

Fig 5 Expand

Table 1.

List of various attacking operations and their parameter values.

More »

Table 1 Expand

Table 2.

PSNR values of the original image and the watermarked image.

More »

Table 2 Expand

Fig 6.

Watermarked images under various attacks.

More »

Fig 6 Expand

Fig 7.

Extracted watermark images from distorted watermarked images.

More »

Fig 7 Expand

Fig 8.

Comparison of algorithm in term of NC values.

More »

Fig 8 Expand

Fig 9.

NC Values of watermark image under different attack operations.

More »

Fig 9 Expand