Research Article

A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication

Table 3

A comparison of the performance of various hashing methods.

Reviewed techniquesL. Chen et al. [41]X. Zhang et al. [19]R. K. Karsh et al. [40]Q. Shen et al. [64]Z. Tang et al. [27]R. K. Karsh et al. [36]C. Qin et al. [42]H. Hamid et al., [48]Z. Tang et al. [35]C. Qin et al. [30]Proposed

Execution time (s)0.17NANANA0.61NA0.112NA0.221.10.6
AUC0.9993NA0.9914NANANA0.96010.92640.9909NA0.999
Average time (s)0.30210.01640.34250.06170.28632.10.22130.66510.99660.81640.2234
Optimal TPR when 0.98270.9998NA0.9980.9530.98230.991NANANA0.8162
Optimal FPR when NA0.47490.00510.1273NANANA0.0621