“…We choose the "F16" in Set9 as the test image and embed the watermark with the strength a with 1, 2, 3, and 4, and then, we will get the four images to be attacked. Table 1 shows the results after processing with the method proposed, and the comparison with Wang et al [26] and several common geometric attacks in StirMark. Let the parameter of the cropping attack be c, and the value is 0.75, 0.5, 0.25 { }; the rotation attack parameter be r, and the value is 180 °, 150 °, 90 °{ }; and the scaling attack parameter be sc, and the value is 0.5, 1.5, 2 { }.…”