Research Article

A Chaos-Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps

Figure 5

Analysis of data loss attack.