Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Table 8

Information entropy comparison of Lena.

AlgorithmsProposedNafise [27]Chai [7]Ayubi [28]Asgar [29]

Information entropy7.99937.99877.99737.99937.9984