Research Article
A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application
Figure 19
Plot of PSNR, NC, SSIM, and BER w.r.t all attacks using watermark 1. (a) Average comparison of PSNR vs. all attacks. (b) Average comparison of NC vs. all attacks. (c) Average comparison of SSIM vs. all attacks. (d) Average comparison of BER vs. all attacks.
(a) |
(b) |
(c) |
(d) |