Research Article
A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication
Table 3
A comparison of the performance of various hashing methods.
| Reviewed techniques | L. Chen et al. [41] | X. Zhang et al. [19] | R. K. Karsh et al. [40] | Q. Shen et al. [64] | Z. Tang et al. [27] | R. K. Karsh et al. [36] | C. Qin et al. [42] | H. Hamid et al., [48] | Z. Tang et al. [35] | C. Qin et al. [30] | Proposed |
| Execution time (s) | 0.17 | NA | NA | NA | 0.61 | NA | 0.112 | NA | 0.22 | 1.1 | 0.6 | AUC | 0.9993 | NA | 0.9914 | NA | NA | NA | 0.9601 | 0.9264 | 0.9909 | NA | 0.999 | Average time (s) | 0.3021 | 0.0164 | 0.3425 | 0.0617 | 0.2863 | 2.1 | 0.2213 | 0.6651 | 0.9966 | 0.8164 | 0.2234 | Optimal TPR when | 0.9827 | 0.9998 | NA | 0.998 | 0.953 | 0.9823 | 0.991 | NA | NA | NA | 0.8162 | Optimal FPR when | | | NA | | 0.4749 | 0.0051 | 0.1273 | NA | NA | NA | 0.0621 |
|
|