Research Article
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
Table 1
Computational-cost comparison between relevant approaches.
|
File name |
No. of Chars | Computational time encoder (ms) | Computational time decoder (ms) | (Tayan et al., [33]) | (Jalil et al., [34]) |
(Meng et al., [35]) | Method A from [36] | Method B from [36] | Proposed approach | (Tayan et al., [33]) | (Jalil et al., [34]) | (Meng et al., [35]) | Method A from [36] | Method B from [36] | Proposed approach |
| Text 1 | 28915 | 30 | 180 | 210 | 20 | 40 | 20 | 20 | 170 | 224 | 10 | 20 | 20 | Text 2 | 47974 | 40 | 160 | 350 | 30 | 60 | 40 | 30 | 240 | 371 | 20 | 40 | 40 | Text 3 | 54839 | 60 | 195 | 410 | 50 | 100 | 60 | 40 | 278 | 460 | 40 | 40 | 70 | Text 4 | 116794 | 80 | 1714 | 1850 | 70 | 190 | 100 | 70 | 1684 | 1891 | 60 | 80 | 110 | Text 5 | 166166 | 130 | 590 | 620 | 120 | 300 | 160 | 100 | 520 | 640 | 100 | 130 | 170 | Ave./char | ā | 0.00089 | 0.0063 | 0.0083 | 0.00071 | 0.0016 | 0.00089 | 0.00065 | 0.0067 | 0.0088 | 0.00052 | 0.00074 | 0.00095 |
|
|