Research Article

Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques

Table 1

Results obtained through learning network.

S. noTest imagesMethodsMetric
PSNRSSIM

1Lena imageDnCNN27.10.71
WNNM26.50.601
MLWT21.740.316
Proposed method31.310.855
2House imageDnCNN22.050.46
WNNM25.410.621
MLWT26.650.685
Proposed method27.980.721
3Number imageDnCNN21.8750.585
WNNM25.9550.611
MLWT24.1950.5
Proposed method29.140.789