Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 1
Trajectory diagram of 2D SF-SIMM. (a) Trajectory diagram with , , and . (b) Trajectory diagram with , , and . (c) Trajectory diagram with , , and .
| (a) |
| (b) |
| (c) |