Skip to main content

Advances, Systems and Applications

Table 12 Different algorithms comparison

From: A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

Conventional attacks

Intensity

Proposed

Algorithm

NC1

Jing L [20]

NC2

Fengming Q [25]

NC3

Yangxiu F [26]

NC4

Ceng X [27]

NC5

Zea A [36]

NC6

Xiaochen Y [37]

NC7

Gaussian

Noise

1%

1.00

1.00

1.00

1.00

0.52

0.88

0.92

10%

0.82

0.79

0.80

1.00

0.68

0.79

0.88

25%

0.74

0.79

0.80

0.77

0.51

0.63

0.81

JPEG

Compression

4%

1.00

0.81

1.00

1.00

0.63

0.11

0.51

8%

1.00

0.97

0.89

1.00

0.59

0.31

0.77

25%

1.00

0.95

1.00

1.00

0.72

0.91

0.85

Median

Filter (10

times)

[3,3]

1.00

0.97

1.00

1.00

0.27

0.15

0.89

[5,5]

1.00

0.88

1.00

0.87

0.44

0.04

0.77

[9,9]

1.00

0.81

0.89

0.50

0.18

0.01

0.69