Research Article
A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application
Figure 10
Plot of PSNR, SSIM, NC, and BER w.r.t the videos taken in the proposed work for watermark 2. (a) Average PSNR vs. no attack using watermark 2. (b) Average SSIM vs. no attack using watermark 2. (c) Average NC vs. no attack using watermark 2. (d) Average BER vs. no attack using watermark 2.
(a) |
(b) |
(c) |
(d) |