Research Article
Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation
Figure 7
Decryption diagram of wrong key.
| (a) Encrypted Lena graph after disturbance |
| (b) Decrypted Lena graph of wrong key |
| (c) Decrypted Lena graph of correct key |