Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 19

Plot of PSNR, NC, SSIM, and BER w.r.t all attacks using watermark 1. (a) Average comparison of PSNR vs. all attacks. (b) Average comparison of NC vs. all attacks. (c) Average comparison of SSIM vs. all attacks. (d) Average comparison of BER vs. all attacks.
(a)
(b)
(c)
(d)