Research Article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Table 9

Local information entropy.

ImageLocal information entropyResult

Barbara7.902155656540Pass
Girl7.902632365459Pass
Lena7.902423121654Pass
Reagan7.902232165444Pass