Research Article
An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem
Figure 9
The cipher images and their decrypted images after data loss attacks. (a) 1/64 occlusion. (b) 1/16 occlusion. (c) 1/4 occlusion. (d) Decrypted image with 1/64 occlusion. (e) Decrypted image with 1/16 occlusion. (f) Decrypted image with 1/4 occlusion.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |