Research Article

Secure Smart Healthcare Monitoring in Industrial Internet of Things (IIoT) Ecosystem with Cosine Function Hybrid Chaotic Map Encryption

Table 11

CCs of two bordering pixels, plain and ciphered images (including test images).

MethodsImagesPlain imagesEncrypted images
HVDHVD

ProposedPepperR0.97860.98200.96945.1e-041.2e-040.0017
G0.97750.99900.96500.0017-6.7e0-4-4.2e-04
B0.97600.9800.96400.00311.6e-04-3.5e-05
LakeR0.96770.96630.95027.6e-04-0.00160.0014
G0.96200.96400.95409.4e-04-0.0011-2.4e-04
B0.96700.96500.95200.00224.5e-040.0031
P001 (keyframe 1)R0.96300.97600.9427-0.00230.00175.5e-04
G0.96200.97400.94109.6e-040.00235.3e-04
B0.96050.97500.94302.2e-060.0022-6.2e-04
P002 (keyframe 2)R0.95780.99050.95112.3e-05-4.3e-040.0032
G0.95600.99000.95050.0028-9.1e-040.0033
B0.95700.99010.95005.2e-07-3.3e-040.0011
P003 (keyframe 3)R0.95540.99260.94986.16e-04-0.0022-3.1e-04
G0.95400.99100.9480-5.3e-04-0.00110.0012
B0.95450.99180.94900.0015-0.00385.01e-04
P004 (keyframe 4)R0.95780.99390.95253.12e-04-0.00160.0011
G0.95000.99060.95100.00150.0024-0.0022
B0.95650.99250.9520-0.00130.00110.0023
P005 (keyframe 5)R0.94940.98890.93863.23e-048.45e-050.0012
G0.94800.98750.93600.00160.0013-0.0014
B0.94850.98700.93754.50e-050.0017-0.0014