Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 17

Plot of PSNR, NC, SSIM, and BER w.r.t blurring attack variance using watermark 1. (a) Average comparison of PSNR vs. blurring attack variance. (b) Average comparison of NC vs. blurring attack variance. (c) Average comparison of SSIM vs. blurring attack variance. (d) Average comparison of BER vs. blurring attack variance.
(a)
(b)
(c)
(d)