Table 4 Comparative analysis of resistance to common attack models.
Method | Resistance to Known-Plaintext Attack (KPA) | Resistance to Known-Ciphertext Attack (KCA) | Entropy (bits/pixel) | Correlation (r) |
|---|---|---|---|---|
Moderate – random shares but weaker seeding | High – random noise but partial correlation possible | 7.95 | 0.0065 | |
Polynomial-based VC25 | High – polynomial interpolation resists mapping | Moderate – partial leakage under limited pairs | 7.92 | 0.0081 |
CRT-based VC24 | High – modular arithmetic enhances protection | Moderate – sensitive to modulus reuse | 7.93 | 0.0079 |
Proposed XOR-based VC | Very High – independent shares via CSPRNG | Very High – uniform distribution, no leakage | 7.997 | 0.0021 |