Research Article
Secure Smart Healthcare Monitoring in Industrial Internet of Things (IIoT) Ecosystem with Cosine Function Hybrid Chaotic Map Encryption
Table 6
Information entropy comparison through relative approaches.
| Methods | Images | Plain image | Encrypted image | R | G | B | R | G | B |
| Proposed | P002 (keyframe 2) | 7.7876 | 7.7255 | 7.6506 | 7.9989 | 7.9975 | 7.9956 | [20] | Keyframe 6 | 6.4410 | 6.3789 | 6.4770 | 7.9978 | 7.9978 | 7.9979 | [50] | Keyframe 4 | 7.0818 | 6.7460 | 7.1210 | 7.9969 | 7.9919 | 7.9954 | [65] | House | 7.4007 | 7.2312 | 7.4357 | 7.9985 | 7.9984 | 79985 | [66] | Baboon | 7.7326 | 7.7591 | 7.4557 | 7.9993 | 7.9993 | 7.9994 | [67] | Girl | 7.3490 | 7.1876 | 6.9857 | 7.9994 | 7.9995 | 7.9994 | [68] | Image 2 | 4.7664 | 4.4860 | 5.0793 | 7.9021 | 7.9027 | 7.9023 | [69] | G01 | 7.16399 | 7.16399 | 7.16399 | 7.99696 | 7.99696 | 7.99696 | [70] | Pepper | NA | NA | NA | 7.9993 | 7.9993 | 7.9991 |
|
|