Research Article
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
Table 3
The relationship between the proportion of tampered files and the efficiency of the algorithm.
| Number of experiments | ā | Tampering rate (%) | 0.1 | 0.2 | 0.4 | 0.6 | 0.8 | 1.0 | 1.5 |
| 10 | 8 | 9 | 0 | 10 | 10 | 10 | 10 | 20 | 15 | 17 | 19 | 20 | 20 | 20 | 20 | 40 | 32 | 36 | 37 | 38 | 40 | 40 | 40 | 60 | 55 | 57 | 58 | 60 | 60 | 60 | 60 | 80 | 72 | 73 | 75 | 77 | 79 | 80 | 80 | 100 | 91 | 93 | 94 | 97 | 99 | 100 | 100 |
|
|