Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 15

Plot of PSNR, NC, SSIM, and BER w.r.t sharpening attack using watermark 1. (a) Average comparison of PSNR vs. sharpening attack variance. (b) Average comparison of NC vs. sharpening attack variance. (c) Average comparison of SSIM vs. sharpening attack variance. (d) Average comparison of BER vs. sharpening attack variance.
(a)
(b)
(c)
(d)