Research Article
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Figure 11
Noise attack analysis: (a, b, c) the noisy encrypted images by SPN with densities; (d, e, f) the deciphered images of (a), (b), and (c).
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |