Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Figure 9

Correlation analysis of girl. (a) Correlation analysis of plaintext. (b) Correlation analysis of ciphertext.
(a)
(b)