Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Table 6
Key sensitivity analysis (%).
| NPCR/UACI | Figure 11(a) | Figure 11(b) | Figure 11(c) | Figure 11(d) | Figure 11(e) | Figure 11(f) |
| Figure 11(a) | — | 0.304531 | 0.303453 | 0.304182 | 0.303810 | 0.304662 | Figure 11(b) | 0.995910 | — | 0.335992 | 0.335495 | 0.335304 | 0.336274 | Figure 11(c) | 0.996135 | 0.995716 | — | 0.336461 | 0.335448 | 0.336229 | Figure 11(d) | 0.995998 | 0.995811 | 0.995693 | — | 0.336208 | 0.337019 | Figure 11(e) | 0.996055 | 0.995536 | 0.995723 | 0.995811 | — | 0.336059 | Figure 11(f) | 0.996269 | 0.995491 | 0.995655 | 0.995841 | 0.995758 | — |
|
|