Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 2
Bifurcation diagram of 2D SF-SIMM. (a) Bifurcation diagram of sequence with and . (b) Bifurcation diagram of sequence with and .
(a) |
(b) |