Research Article
Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation
Figure 7
Decryption diagram of wrong key.
(a) Encrypted Lena graph after disturbance |
(b) Decrypted Lena graph of wrong key |
(c) Decrypted Lena graph of correct key |