This version is not peer-reviewed.
Submitted:
25 October 2024
Posted:
29 October 2024
You are already at the latest version
A peer-reviewed article of this preprint also exists.
MSC: 11R52; 15A09; 15A69
Algorithm 1 Encryption process |
|
Algorithm 2 Decryption process |
|
Video 1 | PSNR | SSIM | FSIM |
---|---|---|---|
1 | 279.8545 | 1 | 1 |
2 | 280.0351 | 1 | 1 |
3 | 279.8906 | 1 | 1 |
4 | 279.4681 | 1 | 1 |
Video 2 | PSNR | SSIM | FSIM |
---|---|---|---|
1 | 248.0390 | 1 | 1 |
2 | 248.2462 | 1 | 1 |
3 | 247.9977 | 1 | 1 |
4 | 246.5033 | 1 | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 MDPI (Basel, Switzerland) unless otherwise stated