Skip to main content
Fig. 3 | EURASIP Journal on Image and Video Processing

Fig. 3

From: Integrated visual security management for optimal condition explorations in resource-constrained systems

Fig. 3

Visual security evaluation results of objective (blue) and subjective (red) metrics for scenarios 1, 2, and 3 (from the subfigure (a) to (r) in case of Foreman video, x-axis represents different encryptions which result in different MOS in the increasing order and y-axis represents visual security). This figure shows the evaluation results from the objective metrics (PSNR, MSSIM, LFBVS, LEG, VIF, and STVSM) and the subjective scores of 66 subjects for various encrypted videos. From the subfigure (a) to (r) in case of Foreman video, x-axis represents different encryptions which result in different MOS in the increasing order and y-axis represents visual security. Figure 3 aims to present how each objective metric correlates with the subjective scores from the human eye’s perception

Back to article page