Research Article
Novel One-Dimensional Chaotic System and Its Application in Image Encryption
Figure 15
Chosen plaintext attack analysis. (a) 5.1.09. (b) 5.1.10. (c) 5.1.11. (d) Encrypted 5.1.09. (e) Encrypted 5.1.10. (f) Encrypted 5.1.11. (g) 5.1.09 xor 5.1.10. (h) 5.1.09 xor 5.1.11. (i) 5.1.10 xor 5.1.11. (j) Encrypted 5.1.09 xor encrypted 5.1.10. (k) Encrypted 5.1.09 xor encrypted 5.1.11. (l) Encrypted 5.1.10 xor encrypted 5.1.11.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |
| (i) |
| (j) |
| (k) |
| (l) |