Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 10

Plot of PSNR, SSIM, NC, and BER w.r.t the videos taken in the proposed work for watermark 2. (a) Average PSNR vs. no attack using watermark 2. (b) Average SSIM vs. no attack using watermark 2. (c) Average NC vs. no attack using watermark 2. (d) Average BER vs. no attack using watermark 2.
(a)
(b)
(c)
(d)