Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 1
Trajectory diagram of 2D SF-SIMM. (a) Trajectory diagram with , , and . (b) Trajectory diagram with , , and . (c) Trajectory diagram with , , and .
(a) |
(b) |
(c) |