Research Article

A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

Table 1

Computational-cost comparison between relevant approaches.

File name No. of CharsComputational time encoder (ms)Computational time decoder (ms)
(Tayan et al., [33])(Jalil et al., [34]) (Meng et al., [35])Method A from [36]Method B from [36]Proposed approach(Tayan et al., [33])(Jalil et al., [34])(Meng et al., [35])Method A from [36]Method B from [36]Proposed approach

Text 1289153018021020402020170224102020
Text 2479744016035030604030240371204040
Text 35483960195410501006040278460404070
Text 411679480171418507019010070168418916080110
Text 5166166130590620120300160100520640100130170
Ave./charā€‰0.000890.00630.00830.000710.00160.000890.000650.00670.00880.000520.000740.00095