Research Article

A Novel Image Encryption Scheme Based on PWLCM and Standard Map

Figure 12

Data loss analysis: (a, b, c) the loss results by cutting of the encrypted image; (d, e, f) the deciphered images of (a), (b), and (c).
(a)
(b)
(c)
(d)
(e)
(f)