From: Secure self-recovery watermarking scheme for error concealment and tampering detection
Method
Spatial attack
Temporal attack
Zhi-yu and Xiang [44]
50.49
–
Hsu et al. [45]
98.34
Lin et al. [46]
82.05
Pan and Lyu [47]
100
Subramanyam and Emmanuel [48]
85.01
99.5
Amerini et al. [49]
98.17
Wang and Farid [50]
Proposed Framework
97.86
96.53