Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 2

Bifurcation diagram of 2D SF-SIMM. (a) Bifurcation diagram of sequence with and . (b) Bifurcation diagram of sequence with and .
(a)
(b)