Research Article

Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images

Figure 3

Illustrations of different feature maps. (a) First column is the input images. (b) Second column is the GM maps of the images in (a). (c) Third column is the PC maps of the images in (a). (d) Fourth column is the ST maps of the images in (a). (e) Fifth column is the orientation maps of the images in (a). (f) Sixth column is the saliency maps of the images in (a). And the images in second, fourth, and sixth rows in (a) are the encrypted images of first, third, and fifth rows in (a), respectively.
(a)
(b)
(c)
(d)
(e)
(f)