Research Article
A Real-Time Image Encryption Method of Networked Inverted Pendulum Visual Servo Control System
Figure 4
Key sensitivity analysis. (a) Original image. (b) Decrypted image: and . (c) Decrypted image: and . (d) Decrypted image: and .
| (a) |
| (b) |
| (c) |
| (d) |