Research Article
Secure Smart Healthcare Monitoring in Industrial Internet of Things (IIoT) Ecosystem with Cosine Function Hybrid Chaotic Map Encryption
Table 5
Information entropy of keyframe and test images.
| Methods | Images | Plain image | Encrypted image | R | G | B | R | G | B |
| Proposed | Pepper | 7.3388 | 7.4963 | 7.0583 | 7.9962 | 7.9831 | 7.9981 | Lake | 7.3124 | 7.6429 | 7.2136 | 7.9876 | 7.9878 | 7.9977 | P001 (keyframe 1) | 7.8579 | 7.9484 | 7.8348 | 7.9971 | 7.9961 | 7.9892 | P002 (keyframe 2) | 7.7876 | 7.7255 | 7.6506 | 7.9989 | 7.9975 | 7.9956 | P003 (keyframe 3) | 7.7592 | 7.6845 | 7.6197 | 7.9978 | 7.9952 | 7.9959 | P004 (keyframe 4) | 7.7925 | 7.7459 | 7.7153 | 7.9984 | 7.9898 | 7.9959 | P005 (keyframe 5) | 7.7982 | 7.8063 | 7.7699 | 7.9988 | 7.9965 | 7.9959 | P006 (keyframe 6) | 7.7754 | 7.7022 | 7.6331 | 7.9899 | 7.9897 | 7.9966 |
|
|