Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 16

Plot of PSNR, NC, SSIM, and BER against rotation attack using watermark 1. (a) Average comparison of PSNR vs. rotation attack variance. (b) Average comparison of NC vs. rotation attack variance. (c) Average comparison of SSIM vs. rotation attack variance. (d) Average comparison of BER vs. rotation attack variance.
(a)
(b)
(c)
(d)