Research Article
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Figure 12
Data loss analysis: (a, b, c) the loss results by cutting of the encrypted image; (d, e, f) the deciphered images of (a), (b), and (c).
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |