Research Article
Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium
Table 3
Encryption time and comparisons (
“pepper” image).
| | | Encryption time (s) |
| | This work | 0.4865 | | Ref. [52] | 1.6734 | | Ref. [58] | 3.704 | | Ref. [59] | 0.712 | | Ref. [60] | 5.6544 | | Ref. [61] | 0.5630 |
|
|