Research Article
A Robust Authentication Algorithm for Medical Images Based on Fractal Brownian Model and Visual Cryptography
Table 3
Performance comparison of different algorithms under various attacks [
2].
| Attacks | Hu and Zhu’s scheme [3] | Gao’s scheme [15] | Xiang et al.’s scheme [16] | Tiankai’s scheme [17] | Proposed scheme |
| Gaussian noise | 0.9300 | 0.8594 | 0.9600 | 0.9854 | 0.9805 | Median filtering 1 | 0.9900 | 0.9453 | 0.9800 | 0.9912 | 0.9980 | Median filtering 2 | 0.9700 | 0.9063 | 0.9800 | 0.9775 | 0.9766 | JPEG (70) | 0.9700 | 1.0000 | 1.0000 | 0.9951 | 0.9951 | JPEG (50) | 0.9600 | — | 0.9900 | 0.9912 | 0.9961 | JPEG (20) | 0.9400 | 0.9570 | 0.9700 | 0.9824 | 0.9795 | Cropping (10%) | 0.9900 | — | — | 0.9756 | 0.9990 | Cropping (20%) | 0.9700 | — | — | 0.9463 | 0.9971 | Rotating 1° | 0.9300 | 0.8164 | — | 0.9102 | 0.9609 | Rotating 2.5° | 0.9700 | — | — | 0.9307 | 0.9844 | Rotating 5° | 0.9600 | — | 1.0000 | 0.9424 | 0.9912 | Rotating 10° | 0.9500 | — | 0.9500 | 0.9580 | 0.9854 | Visibility | No | No | No | Yes | Yes |
|
|