Research Article
A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application
Figure 16
Plot of PSNR, NC, SSIM, and BER against rotation attack using watermark 1. (a) Average comparison of PSNR vs. rotation attack variance. (b) Average comparison of NC vs. rotation attack variance. (c) Average comparison of SSIM vs. rotation attack variance. (d) Average comparison of BER vs. rotation attack variance.
(a) |
(b) |
(c) |
(d) |