Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 1

Trajectory diagram of 2D SF-SIMM. (a) Trajectory diagram with , , and . (b) Trajectory diagram with , , and . (c) Trajectory diagram with , , and .
(a)
(b)
(c)