Research Article
A Robust Authentication Algorithm for Medical Images Based on Fractal Brownian Model and Visual Cryptography
Table 2
Performance comparison of different algorithms under various attacks [
1].
| Attacks | Hsieh and Huang’s scheme [8] | Hsu and Hou’s scheme [13] | Tiankai’s scheme [17] | Proposed scheme |
| Sharpening | 0.752 | 0.819 | 0.9561 | 0.9707 | Median filtering | 0.843 | 0.938 | 0.9775 | 0.9766 | Resizing | 0.733 | 0.887 | 0.9521 | 0.9980 | Noise addition | 0.723 | 0.761 | 0.9854 | 0.9863 | JPEG | 0.845 | 0.956 | 0.9912 | 0.9961 |
|
|