Research Article

A Novel Image Encryption Scheme Based on PWLCM and Standard Map

Figure 11

Noise attack analysis: (a, b, c) the noisy encrypted images by SPN with densities; (d, e, f) the deciphered images of (a), (b), and (c).
(a)
(b)
(c)
(d)
(e)
(f)