Research Article
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Figure 12
Data loss analysis: (a, b, c) the loss results by cutting of the encrypted image; (d, e, f) the deciphered images of (a), (b), and (c).
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |