Skip to main content

Advances, Systems and Applications

Table 13 Different algorithms comparison

From: A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos

Geometric attacks

Intensity

Proposed Algorithm

NC1

Jing L [20]

NC2

Fengming Q [25]

NC3

Yangxiu F [26]

NC4

Ceng X [27]

NC5

Zea A [36]

NC6

Xiaochen Y [37]

NC7

Rotation

(clockwise)

10°

1.00

0.90

0.63

1.00

0.81

0.21

0.86

20°

0.77

0.90

0.63

1.00

0.89

0.17

0.84

40°

0.77

0.86

0.32

1.00

0.74

0.10

0.80

Scaling

0.4

1.00

0.93

1.00

1.00

0.25

0.39

0.59

0.8

1.00

0.93

1.00

1.00

0.68

0.54

0.63

2.0

1.00

1.00

1.00

1.00

0.31

0.92

0.74

Down

Translation

8%

1.00

0.91

0.89

1.00

0.61

0.73

0.86

15%

0.90

0.80

0.50

1.00

0.56

0.66

0.77

20%

0.90

0.71

0.45

0.86

0.56

0.54

0.61

Left

Translation

3%

0.90

0.97

0.72

1.00

1.00

0.77

0.90

5%

0.90

0.97

0.52

0.86

1.00

0.74

0.83

8%

0.74

0.81

0.52

0.86

1.00

0.70

0.66

Cropping

12%

1.00

1.00

1.00

1.00

0.55

0.76

0.97

23%

0.91

1.00

0.89

0.87

0.41

0.21

0.92

35%

0.91

0.61

0.78

0.62

0.33

0.03

0.02