Research Article
A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application
Figure 17
Plot of PSNR, NC, SSIM, and BER w.r.t blurring attack variance using watermark 1. (a) Average comparison of PSNR vs. blurring attack variance. (b) Average comparison of NC vs. blurring attack variance. (c) Average comparison of SSIM vs. blurring attack variance. (d) Average comparison of BER vs. blurring attack variance.
(a) |
(b) |
(c) |
(d) |