Research Article

Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation

Figure 7

Decryption diagram of wrong key.
(a) Encrypted Lena graph after disturbance
(b) Decrypted Lena graph of wrong key
(c) Decrypted Lena graph of correct key