Yes, that is one method to resist canvas fingerprinting, but only resist it. Notice the portion about GPU performance testing, that would work even if the data was fuzzed. The best method seems to be to return fake data that changes frequently, but even that is contested.
Here's a good document with other methods (but not focusing on just canvas fingerprinting): https://2019.www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability
For what it's worth, Firefox does protect against canvas fingerprinting by default it seems. I am not exactly sure how, however.
https://en.m.wikipedia.org/wiki/Canvas_fingerprinting