Research Article
Image Encryption Using the Chaotic Josephus Matrix
Figure 14
Key sensitivity analysis.
 |
| (a) Encrypted image (1, 1, 128, 128, 1, 1, 4, 0) |
|
 |
| (b) Decrypted image (1, 1, 128, 128, 1, 1, 4, 0) |
|
 |
| (c) Decrypted image (1, 1, 128, 128, 1, 2, 4, 0) |
|
 |
| (d) Decrypted image (1, 1, 128, 128, 1, 1, 3.9999, 0) |
|