Research Article

Noise Modulation-Based Reversible Data Hiding with McEliece Encryption

Table 5

Comparison with other schemes in aspects of the ER and PSNR.

SchemesEncryption methodsER (bpp)PSNR
LenaBaboonPlaneBoatPeppersManAverage

[16]Stream cipher1.700.870.961.501.661.451.71+∞
[34]Stream cipher0.250.240.250.250.250.250.24≥35
[25]Paillier0.500.500.500.500.500.500.50≥40
[26]Paillier0.360.270.310.240.290.280.30≥35
[27]Paillier0.560.300.730.430.430.410.56≥35
[22]FHE0.420.260.440.370.420.400.40≥40
[32]Secret sharing2.911.253.242.782.572.192.55+∞
[33]Secret sharing0.330.160.380.210.310.280.32≥45
[23]McEliece2.110.612.181.611.941.741.70+∞
ProposedMcEliece2.932.132.852.412.622.212.53+∞