Research Article
Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium
Table 3
Encryption time and comparisons (
“pepper” image).
| | Encryption time (s) |
| This work | 0.4865 | Ref. [52] | 1.6734 | Ref. [58] | 3.704 | Ref. [59] | 0.712 | Ref. [60] | 5.6544 | Ref. [61] | 0.5630 |
|
|