Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 18

Plot of PSNR, NC, SSIM, and BER w.r.t JPEG vompression attack variance using watermark 1. (a) Average comparison of PSNR vs. JPEG compression attack variance. (b) Average comparison of NC vs. JPEG compression attack variance. (c) Average comparison of SSIM vs. JPEG compression attack variance. (d) Average comparison of BER vs. JPEG compression variance.
(a)
(b)
(c)
(d)