Research Article
A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application
Figure 15
Plot of PSNR, NC, SSIM, and BER w.r.t sharpening attack using watermark 1. (a) Average comparison of PSNR vs. sharpening attack variance. (b) Average comparison of NC vs. sharpening attack variance. (c) Average comparison of SSIM vs. sharpening attack variance. (d) Average comparison of BER vs. sharpening attack variance.
(a) |
(b) |
(c) |
(d) |