Research Article

Image Encryption Using the Chaotic Josephus Matrix

Figure 14

Key sensitivity analysis.
632060.fig.0014a
(a) Encrypted image (1,  1,  128,  128,  1,  1,  4,  0)
632060.fig.0014b
(b) Decrypted image (1,  1,  128,  128,  1,  1,  4,  0)
632060.fig.0014c
(c) Decrypted image (1, 1,  128,  128,  1,  2,  4,  0)
632060.fig.0014d
(d) Decrypted image (1,  1,  128,  128,  1,  1,  3.9999,  0)