Research Article
Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques
Table 1
Results obtained through learning network.
| S. no | Test images | Methods | Metric | PSNR | SSIM |
| 1 | Lena image | DnCNN | 27.1 | 0.71 | WNNM | 26.5 | 0.601 | MLWT | 21.74 | 0.316 | Proposed method | 31.31 | 0.855 | 2 | House image | DnCNN | 22.05 | 0.46 | WNNM | 25.41 | 0.621 | MLWT | 26.65 | 0.685 | Proposed method | 27.98 | 0.721 | 3 | Number image | DnCNN | 21.875 | 0.585 | WNNM | 25.955 | 0.611 | MLWT | 24.195 | 0.5 | Proposed method | 29.14 | 0.789 |
|
|