Research Article
Image Encryption Using the Chaotic Josephus Matrix
Figure 14
Key sensitivity analysis.
 |
(a) Encrypted image (1, 1, 128, 128, 1, 1, 4, 0) |
|
 |
(b) Decrypted image (1, 1, 128, 128, 1, 1, 4, 0) |
|
 |
(c) Decrypted image (1, 1, 128, 128, 1, 2, 4, 0) |
|
 |
(d) Decrypted image (1, 1, 128, 128, 1, 1, 3.9999, 0) |
|