Research Article

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Figure 8

Plots of PSNR, SSIM, NC, and BER of input videos against no attack. (a) Average PSNR vs. no attack using Watermark 1. (b) Average SSIM vs. no attack using Watermark 1. (c) Average NC vs. no attack using Watermark 1. (d) Average BER vs. no attack using Watermark 1.
(a)
(b)
(c)
(d)