Table 11 Comparison of mandrill image with recent literature.
From: Securing face images in UAV networks using chaos and DNA cryptography approach
Tests | Results | ||||
|---|---|---|---|---|---|
Proposed scheme | |||||
Entropy | \(\:7.9992\) | \(\:7.99916\) | \(\:7.99866\) | \(\:7.9969\) | \(\:7.9905\) |
PSNR | \(\:8.9619\) | \(\:8.92843\) | \(\:8.92936\) | \(\:8.94253\) | \(\:8.79929\) |
MSE | \(\:8908.61\) | \(\:8322.19\) | \(\:8320.41\) | \(\:8295.21\) | \(\:8573.38\) |
UACI | \(\:33.5671\) | \(\:29.494\) | \(\:30.3873\) | \(\:30.3432\) | - |
NPCR | \(\:99.7163\) | \(\:99.6201\) | \(\:99.5855\) | \(\:99.63\) | - |
SSIM | Proposed scheme | Â | |||
\(\:0.00091\) | \(\:0.0075615\) | 0.000106 | 0.000021 | ||