Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Table 6

Key sensitivity analysis (%).

NPCR/UACIFigure 11(a)Figure 11(b)Figure 11(c)Figure 11(d)Figure 11(e)Figure 11(f)

Figure 11(a)0.3045310.3034530.3041820.3038100.304662
Figure 11(b)0.9959100.3359920.3354950.3353040.336274
Figure 11(c)0.9961350.9957160.3364610.3354480.336229
Figure 11(d)0.9959980.9958110.9956930.3362080.337019
Figure 11(e)0.9960550.9955360.9957230.9958110.336059
Figure 11(f)0.9962690.9954910.9956550.9958410.995758