Research Article
A Novel Selective Encryption Method Based on Skin Lesion Detection
Table 4
Number of iterations and CPU times in seconds of Figure
3.
| Model | (a) | (b) | (c) | (d) |
| Diffusion [26] | 100 | 200 | 100 | 300 | 69.5 | 195.2 | 20.2 | 366.7 |
| Ours | 25 | 20 | 30 | 13 | 12.6 | 11.1 | 6.1 | 7.3 |
|
|